<br />
<b>Deprecated</b>:  Function create_function() is deprecated in <b>/home/hidefide/public_html/blog/wp-content/plugins/wr-pagebuilder/core/core.php</b> on line <b>127</b><br />
{"id":135,"date":"2018-07-17T12:28:53","date_gmt":"2018-07-17T12:28:53","guid":{"rendered":"https:\/\/icaruspressblog.wordpress.com\/?p=135"},"modified":"2019-04-17T12:21:55","modified_gmt":"2019-04-17T12:21:55","slug":"data-insecurity-why-we-fail-to-protect-our-data","status":"publish","type":"post","link":"https:\/\/hidefideas.com\/blog\/2018\/07\/17\/data-insecurity-why-we-fail-to-protect-our-data\/","title":{"rendered":"Data Insecurity: Why We Fail to Protect Our Data"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-138 alignright\" src=\"http:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/dilbert_data_security.jpg\" alt=\"Dilbert_data_security\" width=\"446\" height=\"395\" srcset=\"https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/dilbert_data_security.jpg 475w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/dilbert_data_security-300x266.jpg 300w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/dilbert_data_security-169x150.jpg 169w\" sizes=\"auto, (max-width: 446px) 100vw, 446px\" \/>It seems that every week a new company, organization or government agency has become the poster child for what not to do when protecting valuable data. This week alone, the <a href=\"http:\/\/www.reuters.com\/article\/2011\/07\/14\/us-usa-defense-cybersecurity-idUSTRE76D6Y820110714\">U.S. Government announced<\/a> <!--more-->that one of its biggest defense contractors lost 24,000 files in an attack by a foreign intelligence service.&nbsp; The defense company wasn\u2019t named, nor was the foreign intelligence service, but we do know that Lockheed Martin <a href=\"http:\/\/www.allspammedup.com\/2011\/06\/lockheed-martin-latest-to-succumb-to-%E2%80%9Csignificant%E2%80%9D-cyber-attack\/\">was compromised<\/a> in June. &#8220;It was 24,000 files, which is a lot,&#8221; Deputy Secretary of Defense William Lynn said. &#8220;But I don&#8217;t think it&#8217;s the largest we&#8217;ve seen.&#8221; When asked if he knew who was responsible for the attack, Lynn responded, <em>&#8220;We have a pretty good idea,&#8221; <\/em>and some pundits are <a href=\"http:\/\/www.circleid.com\/posts\/20110714_pentagon_reveals_largest_ever_loss_of_defense_data_in_cyberattack\/\">pointing the finger<\/a> at China as the villain in this cyber drama.<!--more--><!--more--><\/p>\n<p>In another example, more than 80,000 residents of the Durham Region of Ontario, Canada are <a href=\"http:\/\/www.durhamregion.com\/news\/article\/177663?mkt_tok=3RkMMJWWfF9wsRonuqrBZKXonjHpfsX6%2FbF8APvv3Mga3E5XdrGeaRepm8ZTLIA3Y%2BCGXAAcHJNqzQ1LDuWHb4VD7%2BdUH1g%3D\">suing the Region<\/a> in a $40 million class action that accuses the Region Health Authority of losing a USB key that contained personal information for people vaccinated against the H1N1 flu virus. In that case, a public health nurse lost the key in a parking lot. Also on the healthcare front, a former patient of a cancer treatment center in St. Louis, Missouri is <a href=\"http:\/\/www.courthousenews.com\/2011\/07\/01\/37838.htm?utm_medium=twitter&amp;utm_source=twitterfeed\">suing the hospital<\/a> for the loss of her confidential information when a laptop \u201cstuffed\u201d with patient information. The problem? The information on the laptop was unencrypted.<\/p>\n<p>One more example: unless you\u2019ve been vacationing on Mars for the past few months, you\u2019ve probably heard a lot about a little matter known as the <a href=\"http:\/\/www.allspammedup.com\/2011\/05\/psn-security-breach-gaming-not-so-fun-anymore-a-warning-to-others\/\">Sony PSN breach<\/a>. The highly-publicized outage of the PlayStation Network became a bit of a joke, especially since it seems that much of the compromised data was <a href=\"http:\/\/www.cbc.ca\/news\/world\/story\/2011\/06\/03\/sony-2nd-data-breach.html\">unencrypted<\/a>. Sony was quick to counter that the credit card information was secure, but they were also quick to insist (it wasn\u2019t optional) that all users change their passwords once the network was brought back up. CBC news quoted a security expert as saying that &#8220;any website worth its salt these days should be built to withstand such attacks.&#8221;<\/p>\n<h2><strong>The Human Factor<\/strong><\/h2>\n<p>See a pattern here? If not, let\u2019s spell it out: Mr. Lynn of the Department of Defense states \u201cI don\u2019t think it\u2019s the largest we\u2019ve seen\u201d; The public health nurse from Durham Region lost a USB key in a parking lot; the stolen laptop in St. Louis contained confidential information that wasn\u2019t encrypted; and data on more than 100 million Sony PSN users was unencrypted.<\/p>\n<p>There are two parallel issues here. The first one is easy: a lack of proactive planning. The security expert quoted in the CBC article is correct. How could a defense contractor which builds weapons systems and other military hardware for the United States allow itself to be breached, especially since the Defense Department admitted to knowing that it\u2019s happened before? How could Sony compromise the data of 100 million users and lose hundreds of millions of dollars in the ensuing cleanup? The answer isn\u2019t complicated. People didn\u2019t do their jobs. Now, it might be tempting to argue that a <a href=\"http:\/\/www.informationweek.com\/news\/security\/attacks\/231001175\">group of hackers aged 15 to 28<\/a> know far more, and have more in the way of resources, than the largest military power in the world, and one of the globe\u2019s leading technology firms. In case you missed it, that was sarcasm.<\/p>\n<p>It\u2019s the human factor. Look no further than the second parallel issue: a nurse who dropped a USB key, and a misplaced laptop loaded with unencrypted information on cancer patients. No matter how you look at these stories, the dominating factor is basic human error.<\/p>\n<h2><strong>Planning, Training and Vigilance<\/strong><\/h2>\n<p>Information is the lifeblood of any organization, but people are the body which makes the blood flow. Take spam, for example. Spam is dangerous, but not always for the reasons you think. Any IT technician is smart enough to detect spam and give it what it deserves \u2013 an unceremonious trip to the trash can. In fact, most educated people, IT professionals or not, can recognize spam for what it is: ridiculous, ill-conceived and at times, mind-numbingly&nbsp;stupid. However, while organizations spend tremendous amounts of money on technology, it\u2019s distressing that they spend little educating the people who use the technology.<\/p>\n<p>A few years back, I worked for a government agency that employed thousands of people. Every day, I received hundreds of emails and a substantial amount of those were \u2018social spam\u2019 \u2013 messages sent by coworkers peddling a funny joke, an interesting video, or a pithy piece of pseudo-wisdom. In fact, the task of cleaning up the social junk often represented a chunk of my time, detracting from doing what I was there to do \u2013 what I was paid to do. A week didn\u2019t go by where I didn\u2019t pull the IS manager aside and suggest that she convene a training session to educate the employees on the dangers of social spam. Those requests were met in the form of an agency-wide email and nothing more.<\/p>\n<p>Most organizations have the planning part down, but they don\u2019t seem to be able to educate their organizational structure. They don\u2019t teach vigilance \u2013 some call it paranoia \u2013 the way IT people know vigilance, and that\u2019s why data protection is so tenuous.<\/p>\n<p>The fear is constant: the people who engage in social spam \u2013 you know the type, because they adopt similar practices on Facebook and Twitter \u2013 are the ones who will click an errant link, succumb to a phishing scam, lose a USB key, leave a laptop with patient data lying around, and yes, even fail to protect U.S. military documents from foreign countries. So before you go to sleep tonight, ask yourself this: can you sleep with confidence, knowing that every person in your organization \u2013 every person who has access to a PC \u2013 has your back? Ask yourself if they know enough to recognize a phishing site or a spam email when they see it.<\/p>\n<p>And then strenuously lobby your senior management for rigorous training policies.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It seems that every week a new company, organization or government agency has become the poster child for what not to do when protecting valuable&hellip; <\/p>\n","protected":false},"author":3,"featured_media":138,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14],"tags":[11,9,10,8,7],"class_list":["post-135","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-spam","tag-allspammedup","tag-bot","tag-botnet","tag-malware","tag-spam","jsn-master"],"_links":{"self":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/comments?post=135"}],"version-history":[{"count":3,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/135\/revisions"}],"predecessor-version":[{"id":1849,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/135\/revisions\/1849"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media\/138"}],"wp:attachment":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media?parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/categories?post=135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/tags?post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}