Video

Why Target Breach Was Preventable

Adam Tegg of Wontok Solutions on Fighting Malware
Why Target Breach Was Preventable

The Target retail POS breach is the most talked-about incident in recent memory - and it was entirely preventable with available security solutions, says Adam Tegg, CEO of Wontok Solutions.

See Also: Critical Condition: How Qilin Ransomware Endangers Healthcare

Malware attacks against merchants are on the rise, Tegg says, and to mitigate risks organizations must prioritize their deployment of updated technology platforms and effective security strategies.

In a video interview recorded on the expo floor of RSA 2014, Tegg discusses:

  • Why the Target breach was preventable;
  • Malware trends to watch;
  • How to prepare for the pending Windows XP support expiration.

Tegg brings a wealth of experience in delivering growth and development strategies for innovative companies to Wontok, where he leads the company's overall strategy and direction. He played an integral role in Wontok's acquisition of SafeCentral in 2011, and has transformed Wontok into a channel centric global cloud and endpoint security solutions company. He is a seasoned high tech and telecommunications professional with 10+ years' working in the sector. Prior to co-founding Wontok in 2005, Tegg delivered the rapid growth and ultimately the successful sale of Protel Group. Prior to this he worked at Barclays Capital, Credit Suisse and KPMG.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.