Monster Trojan alarms recruitment industry

Symantec's discovery of a Trojan that stole personal information from the Monster online recruitment service has put the rest of the recruitment industry on notice that they are prime targets for attack.

Symantec's discovery of a Trojan that stole personal information from the Monster online recruitment service has put the rest of the recruitment industry on notice that they are prime targets for attack.

Sophie Relf, head of marketing at TotalJobs, said the company took the safeguarding of personal data very seriously.

"Fortunately, we had one of our regular top to bottom maintenance programmes scheduled for this weekend, but we watch constantly for robot files in attachments and network traffic patterns for unusual activity.

"This includes spidering in case anyone tries to copy and republish jobs or CVs or tries to get into the CV database without permission," she said.

Relf said it was unlikely that people could use the Monster Trojan to steal its clients' data. "Monster has an electronic template that people fill in to record their details," she said. "All our documentation is in Word or text files that are uploaded as attachments.

"In addition, clients do not have to register with us they can apply and send CVs while they are browsing."

Relf said this did not mean TotalJobs was complacent. "On the contrary," she said, "we take it very seriously. This incident is a warning to the entire recruitment industry."

Read more on Hackers and cybercrime prevention

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close