About Us

TTEC Solved Cyber Security Incident

TTEC Holdings, world’s leading CX (customer experience) technology and service innovators for end-to-end digital CX solutions, resolved the cyberattack on its technology infrastructure.

TTEC noticed the cybersecurity incident on September 12 and began remediation and recovery efforts immediately. The incident was contained after the company isolated the affected systems and implemented other corrective measures. In addition, the company has launched a full investigation into the cyberattack, and it is using the results of that investigation to help its own cyber security measures. Despite initial setbacks, TTEC is now up and running all over the world.

“TTEC moved quickly and decisively to identify, contain, and resolve the cyberattack. In just five days our team moved aggressively to rebuild and further solidify our processes and infrastructure. TTEC continues to prioritize our client and people-facing processes and systems,” said Ken Tuchman, TTEC chairman and CEO.

Tuchman said, “I am humbled by the effort and resilience that the TTEC family showed during the past few days, and their continued hard work to support our clients. Our expertise in business continuity and incident response allowed us to continue to serve our clients, despite the many complications presented in this incident.”

The firm has completed the initial recovery measures, strengthened its cyber security, and is in the process of wrapping up its investigation and evaluating the incident’s effect on the organization.

Omada and SecZetta Collaborate to Decrease Threat of Third-Party Breaches

Omada, a worldwide provider of Identity Governance and Administration (IGA) solution announced an integration with SecZetta, a leading provider of third-party identity risk management solutions. Companies will be able to minimize the risk of third-party data breaches as a result of the integration.

SecZetta delivers easy-to-use, purpose-built third-party identity risk solutions to assist organizations in implementing risk-based identity access and lifecycle strategies for third-party non-employee populations such as contractors, supply chain, suppliers, partners, bots, and more. SecZetta information on managing third-party identities, onboarding, role changes, contract extension, termination, and identity risk management is used by Omada to help third-party users make better access decisions.

Companies are in danger because of this absence of protocol with non-employees; an estimated two-thirds of data breaches nowadays are caused by a third party. Businesses require a way to track and manage all of the people and things who have access to corporate systems. SecZetta uses a collaborative onboarding process to gather contextual information on third-party non-employees, which it then sends to Omada for providing and de-provisioning of access, as well as identity governance and access for SecZetta’s customers.

“Organizations are hyper-focused on adopting Zero Trust policies in the hope of reducing the risk of access-related cybersecurity incidents. Our integration with Omada enables organizations to extend the diligence they have around providing least privilege access to employees to their riskier, non-employee users,” said Jeremy Rohrs, Senior Vice President of Global Sales & Business Development, SecZetta.

“With most organizations today relying on third parties to achieve business goals, it’s critical to get access management right. It’s a balance between security and productivity – and that’s what this integration provides. Organizations can work confidently with non-employees, knowing they are all fully accounted for without creating a drag on IT resources,” said Michael Garrett, CEO, Omada.

T-Mobile’s Security breach now Affects 54.6 Million People

T-Mobile has continued to work around the clock on the forensic analysis and investigation into the cyberattack against T-Mobile systems while also taking a number of proactive steps to protect customers and others whose information may have been exposed.

Their investigation still underway and will take some time, but they are sure that they have blocked the bad actor’s access and egress points.

T-Mobile previously disclosed that personal information from roughly 7.8 million current T-Mobile postpaid customer accounts, including first and last names, dates of birth, Social Security numbers, and driver’s license/ID numbers, had been compromised. Phone numbers, as well as IMEI and IMSI information, the normal identifier numbers linked with a mobile phone, were also hacked, according to T-Mobile. In addition, another 5.3 million existing postpaid customer accounts have been discovered as having one or more linked customer names, addresses, dates of birth, phone numbers, IMEIs, and IMSIs fraudulently accessed. SSNs or driver’s license/ID details were not compromised in these other accounts.

T-Mobile previously disclosed that data files containing information on about 40 million past or potential T-Mobile customers, including first and last names, dates of birth, Social Security numbers, and driver’s license/ID numbers, had been compromised. Since then, another 667,000 former T-Mobile customers’ accounts have been accessed, with user names, phone numbers, addresses, and dates of birth exposed. SSNs or driver’s license/ID details were not compromised in these other accounts.

T-Mobile has also discovered further stolen data files, including phone numbers, IMEI numbers, and IMSI numbers. There was no personally identifying information in that data.

There is still no indication that any of the stolen files contained any consumer financial information, credit card information, debit card information, or other payment information.

Approximately 850,000 current T-Mobile prepaid customer names, phone numbers, and account PINs were exposed, according to T-Mobile. T-Mobile has reset ALL of the PINs on these accounts proactively. Additional dormant prepaid accounts were also accessed for similar information. Up to 52,000 names associated with current Metro by T-Mobile accounts may have been included as well. There was no personally identifiable information in any of these data sets. Furthermore, no former Sprint prepaid or Boost customers were among the T-Mobile files obtained.

T-Mobile is continuing to take steps to protect everyone who is at danger from this cyberattack, including those who were recently identified by T-Mobile. T-Mobile has communicated with millions of customers and others who have been affected, and is offering assistance in a variety of ways.

SoftServe obtains Security Specialization in Google Cloud Partner Advantage Program

SoftServe, a global digital authority and consulting firm and Google Cloud Premier Partner, has earned the Google Cloud Partner Advantage Program’s Security Specialization after demonstrating its experience and competence in developing security solutions on Google Cloud’s Platform.

“We are excited to add this Security Specialization at a time when cybercrime is becoming ever more prevalent and attacks are becoming more sophisticated. Time tested expertise in digital security on Google Cloud differentiates SoftServe as a trusted advisor and provider to enterprise clients focused on keeping their organization and reputation secure on their digital transformation journeys,” said Todd Lenox, VP Alliances and Partnerships at SoftServe.

The Google Cloud Partner Advantage Program connects qualified partners with Google Cloud customers that have established technical proficiency and proven performance in specific solution and service areas. SoftServe’s proven ability to secure customer infrastructure and workflows to Google Cloud is demonstrated by the Security Specialization.

In April 2017, SoftServe joined Google Cloud’s Partner Advantage Program, and in August 2018, it was named a Google Cloud Premier Partner. It also offers specialisations in Data Analytics, Machine Learning, Infrastructure, Internet of Things, and Cloud Migration.

XYPRO and Hewlett Packard Enterprise are expanding their partnership to offer a full suite of security solutions on HPE NonStop systems

XYPRO Technology Corporation (XYPRO), a global leading organization in cybersecurity,  identity management, analytics and secure database management software, announced the expansion of a decades-long cooperation with Hewlett Packard Enterprise (HPE) to deploy its whole package via HPE NonStop systems. HPE NonStop systems, which are designed for mission-critical situations that require 100 percent fault tolerance, now include extended XYPRO solutions for improved threat detection and security management capabilities.

This expansion is in line with XYPRO’s growth plan and broadens the availability of mission-critical database management, security, and integration solutions into new sectors throughout HPE’s customer base. XYPRO’s flagship product, XYGATE SecurityOne, a patented security, compliance, and threat detection platform, and XYGATE Identity Connector, the first and only Sailpoint and CyberArk integrations for HPE NonStop systems, are among the solutions that help customers protect their mission-critical environment. Customers can now use HPE NonStop systems to meet criteria for securing and monitoring mission-critical investments.

HPE offers the whole XYPRO cybersecurity product family, including XYGATE SecurityOne (XS1) and Integrations.

“In our history of delivering risk management solutions for HPE NonStop systems customers longer than anyone has, we strive for meaningful and strategic business relationships while providing great support and leading edge security solutions. Our strong relationship with HPE is why several XYPRO solutions have shipped with the HPE NonStop operating system for more than a decade,” said Lisa Partridge, CEO, XYPRO. “Making the rest of the XYPRO’s solution suite available through HPE further strengthens security within the HPE NonStop system ecosystem, providing customers security and consistency at significant value.”

“Ensuring reliable cybersecurity and management capabilities is critical for customers running always-on, 100% fault-tolerant environments with sensitive data exchange,” said Jeff Kyle, vice president and general manager, Mission Critical Solutions, HPE. “By building on our long-standing partnership with XYPRO to expand security capabilities with new analytics and automation features on our HPE NonStop systems, we are furthering our ability to deliver trusted platforms for mission-critical needs that are easy to manage while meeting strict data governance requirements.”

Juniper Networks and Corero Network Security team up to give Critical DDoS Protection Solution to Plusnet GmbH

Corero Network Security plc, a global provider of real-time, automated Distributed Denial of Service (DDoS) cyber defence solutions and Juniper Networks, a worldwide leader in secure, AI-driven networks, have collaborated to provide Plusnet, a provider of communications and network services to 25,000 enterprises in Germany, with a combined DDoS Protection Solution to safeguard its infrastructure, business, and clients.

DDoS attacks have been a part of the threat landscape for more than two decades, but their frequency, scale, and intelligence are constantly increasing. Plusnet, which serves 200 cities and regions across Germany, used to examine anomalies in traffic patterns using an internal data filtering system. However, when attacks grew and changed, this in-house security solution required manual intervention, which was neither practicable nor successful. To protect its national network from attack-driven outages, Plusnet wanted to automate DDoS mitigation with effective, dynamic, and scalable security.

Ralf Weber, Head of Competence Center Network & Security, Plusnet said, “During the testing phase of the Juniper-Corero solution, we could immediately see a manageable stream of DDoS attacks. With the Juniper-Corero solution, Plusnet is able to further improve network protection without any significant impact on network performance.”

“More than ever before, providers need to ensure that their infrastructure and business operations are always available to deliver an exceptional user experience. This can only be achieved when security is built into the same network infrastructure that provides connectivity and extended across every point of connection. Plusnet is a great example that leverages Juniper Connected Security to enable the threat-aware network, ensuring its operations are comprehensively protected 24/7 against the growing risk of DDoS attacks,” said Samantha Madrid, Vice President, Security Business & Strategy, Juniper Networks.

“We are very pleased to continue partnering with Juniper Networks to provide a superior DDoS solution that is now protecting thousands of customers around the globe. The SmartWall TDD solution couples Corero’s surgically accurate, real-time automatic DDoS protection with the high-performance packet filtering of Juniper MX Series routers. This, along with the comprehensive visibility into attacks, enabled Plusnet to implement a cutting-edge solution that can detect and mitigate DDoS attacks in seconds to protect its network and the ones of its customers,” said Lionel Chmilewsky, Chief Executive Officer at Corero Network Security.