The apparent hack of several email accounts belonging to the Bush family has launched an investigation by the U.S. Secret Service. Some of the stolen emails divulged sensitive information, including correspondence, addresses and cell phone numbers belonging to the former presidents George H.W. Bush and George W. Bush, as well as dozens of other Bush family members.
Reports indicate that a hacker known as Guccifer infiltrated the emails, which were sent between 2009 and 2012. Several family photographs were also seized and posted online. The photos include shots of the elder Bush in the hospital and images of self-portraits painted by George W. Bush.
Perhaps of greatest concern was the revelation that one infiltrated email contained the home address of George W. Bush, along with the security gate code. The email originated from the account of a scheduler for the former president.
This invasion of the Bush family’s privacy demonstrates the significant effects of the growing cybercrime problem, in the U.S. and around the world. Users of email, online banking and social media may trust that their private information and correspondence will remain private – but hackers are proving time and again that this is no longer the case.
Individuals, government agencies, the U.S. military, private companies and public corporations are all vulnerable to the misdeeds of cybercriminals, and need the protection that can only come from experts with the high level of knowledge required to stop hackers before they can cause significant harm.
Government officials at every level are emphasizing the need for greater emphasis on cybersecurity to prevent the theft of sensitive data, financial information and individual identities. From President Obama on down, officials are calling for an increase in the hiring of information assurance and cybersecurity experts who can monitor, anticipate and thwart hacker's activities.
Opportunities are better than ever for information technology professionals to step into leadership positions, securing the nation’s information networks, along with their own futures. Now is the time to obtain the in-demand, specialized information assurance knowledge that will protect governments, companies and individuals worldwide from hackers’ relentless attempts to steal their information, data and secrets.