
BreachExchange mailing list archives
In data-heavy economy, breaches likely
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Thu, 6 Feb 2014 19:05:26 -0700
http://au.finance.yahoo.com/news/data-heavy-economy-breaches-likely-010102183.html Target. Neiman Marcus. And now three other national retailers (yet to be named) have reportedly lost customers' personal data. The Target breach alone compromised the data of as many as 110 million Americans - roughly one of every three people in the country. The recent cascade of scams is an unwanted manifestation of the technology we carry in our pockets, the business we conduct online and the ever-growing array of devices, merchants, service providers and agencies we entrust with pieces of our identity. Think of how often you swipe your card at the counter, fill out an online form, or even enter your user name and password into a website. Every time, you're sharing information that thieves are itching to get their hands on. In 2012, the latest year for which widely accepted statistics are available, 621 confirmed data breaches compromised 44 million individual records. That's according to Verizon's annual Data Breach Investigation Report, considered by many to be the definitive measure of data intrusions in the industry. Even that is not a comprehensive figure: It's limited by the number of organisations that participate, a roster that includes outfits as diverse as Deloitte and the US Department of Homeland Security. Because the number of participants changes constantly, it's also impossible to compare year-over-year stats. Thus, there's no way to confirm the widespread perception that the number of breaches is growing. But other firms that tally breaches put the number even higher. Among veterans of the information security wars, it's widely assumed that "100 per cent" of Fortune 500 companies have been hacked at some point, said Robert Lee, a security business partner at Intuit. Even scarier: "It's very difficult to get a hacker out of your environment once they have a foothold," Lee said. The beauty of being a hacker is that you only have to exploit one weakness. The problem of being in IT is that you have to protect against all potential attacks. And the points of attack just keep growing as more of our lives occur in cyberspace. You can think about firewalls - the primary tool companies use to safeguard data - as a series of concentric circles. At each circle, a checkpoint looks at incoming information and assesses if it's OK, or not OK, to let it through. But no matter how many checkpoints a system has, there's a vulnerability they're blind to. "Think of them as outward-facing," said CEB TowerGroup research director Jason Malo. "You are standing on the wall, (trying to repel) someone (who) wants to come inside the castle." The problem is, every system is hackable, and because the defences are outward-facing, a thief who sneaks in can often harvest data undetected for months or even years. Breaches usually go unnoticed for six to 13 months, giving malware ample time to do what it was designed to do, steal customer or company information, said Jake Kouns, chief information security officer for Risk Based Security, which runs the DataLossDB project. "Once an attacker is inside the network, it's 'game over,' " said Adam Ghetti. He's the founder of Atlanta-based Ionic Security, which provides encryption services to banks, hospitals and other companies. "The centralisation of assets has been a protection method for centuries," said Ken Baylor, a research vice president at the information security research and advisory company NSS Labs. "Banks secured their data in vaults. Companies now centralise them in databases. "At least with a vault, banks knew when they had been robbed," Baylor said. "With databases, a copy can be created in seconds and the company is unaware that millions of its customers have been put at severe risk." Retailers, in particular, aren't properly protecting their in-house databases, Ghetti said. "Retail enterprises continue to invest in, and lean heavily on, perimetre security technologies," he said in an email. It's not as if IT folks can't come up with solutions. But businesses are caught in a tug of war between risk and reward, said Lee. "Businesses are transferring risk to users, with the reward of higher profits for themselves," he said. "We know how to solve these problems; some companies choose not to."
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- In data-heavy economy, breaches likely Audrey McNeil (Feb 11)