Reference no: EM133233147
The CEO of Trusty Co, a fictitious company, came to you in the information security office today to inquire how his competitor Trusty Inc, another fictitious company, was able to release our secret widget before us. He wants a full report on how Inc stole his information as soon as possible.
Using the data loss prevention security tools and searching for the name of the secret widget, you were able to determine the CEO had been emailing the plans and designs to his personal email address. This was the only time the secret material was outside the control of the organization.
After interviewing the CEO, you learn that six months ago, he received a popup from a company he believed to be Microsoft on his home computer while he was working on the plans for the secret widget. The popup stated his updates had failed and gave him a phone number to call for support. He called the number and followed their instructions believing they helped him resolved the issue. From experience, you know that Microsoft doesn't operate this way, and that his home computer had been compromised while he was working on the secret widget plans.
Research the compromise to understand how it happened and how to prevent it in the future. Write a report for the CEO that describes how the data was compromised and describe the evidence you have that supports this theory. Finally summarize recommendations to the CEO how this can be prevented in the future.