Category: security

  • Strategic lessons from a security breach

    Strategic lessons from a security breach

    2011 has been the year of the IT security breach. Big and small organisations around the world ranging from major corporations like Sony through to smaller businesses such as security analysts Stratfor found their customer data released onto the web.

    The frustrating this is most of these breaches are avoidable and “hacking” is often giving too much credit for the security used by the targeted companies.

    While the ‘hackers’ themselves may be skilled, the compromised organisations are often easy targets as they don’t follow the basic rules of protecting their data.

    Standards matter

    Customer payment account details are covered by the Payment Cards Industry -Data Security Standard (PCI-DSS) operated by the PCI Security Standards Council.

    The PCI Security Standards Council helpfully has a range of information sheets for merchants of all sizes and if you are taking payments off the web you should make yourself aware of the basic requirements.

    For most businesses, the cardinal rule is not to save customer’s card details. Once the payment is approved, you have no business retaining the client’s credit card or bank account numbers.

    In Stratfor’s case, they were almost certainly processing payments manually and credit card details were being saved on customers’ records in case of errors or to make renewals easier.

    Call in the professionals

    There’s no shortage of payment companies, ranging from PayPal through specialist services like eWay to your own bank’s services. Choose the one that works best for you. If you have no idea, call in someone who does.

    One of the arguments for using outsourced services, particularly cloud computing, is how data security is a complex field that requires professional and qualified expertise. The internal systems of Sony, Telstra and Stratfor were not up to the demands placed upon. A professional service is better equipped to deal with these issues.

    Size doesn’t matter

    A major lesson from the last year’s security breaches is that it’s not just the local shop or garage e-commerce business that is careless with data. Some of the world’s biggest companies and government agencies have been compromised.

    If anything, Sony’s experience has shown the double standards at work in the application of security rules; there’s no doubt that had a local computer shop been as thoroughly compromised as Sony were, they would have been shut down on the second breach and the management would have been carted off to jail well before the twelfth.

    For the management of Sony, there seems to have been little in the way of sanctions of the people nominally responsible for this incompetence. This has to change both within organisations and by those charged with enforcing the rules.

    The lesson for customers is you can’t trust anyone with your data; don’t assume the big corporation is any more secure than the serving staff at your local sandwich shop.

    Passwords matter

    Every time one of these breaches happen we hear about password security, with “experts” pointing out that some of the subscribers were using passwords like ‘statfor’ or ‘password’.

    For customers, this actually makes sense if you can’t trust third parties with your details so specific, disposable passwords for each site should be used. There’s little point in having a complex password if some script kiddie is going to post your login details onto 4Chan.

    Naturally your passwords for banking and other critical websites should be very different and far more secure than those you use for sites like Stratfor and the Sony Playstation Network.

    Will 2012 be any different?

    Given the data embarrassments of 2012 for businesses and government agencies, can we expect lessons to be learned in 2012?

    While many businesses are going to learn specific lessons from these breaches, there’s a management cultural problem where any spending on information systems is seen as a cost that has to be minimised.

    This cost cutting mentality lies at the core at many organisations’ failure to secure their systems properly and until a more responsible culture develops we’ll continue to see these lapses.

    Good managers and business owners who understand the importance of guarding their organisation’s and customer’s data are those who are ahead of their competition. Over time, these folk who will have the competitive advantage.

    For customers, the sad lesson is we can’t trust anyone and a layered approach to security along with keeping a close eye on our bank accounts and credit card statements is necessary.

    Similar posts:

  • Protecting your technology over the holidays

    Protecting your technology over the holidays

    This post first appeared in the Xero Accounting Software Blog, the advice for protecting your computers and networking equipment applies for home and business users.

    The holiday season is here and for many it’s time for a much needed break. Before doing so it’s worthwhile taking a few precautions with your computers and other electronic equipment.

    While most of us are moving our data to the cloud, there may still be some data that remains on your office systems. Bear in mind that if your router is damaged or desktop computer has gone missing, you won’t be able to access the web.

    And even though your systems will spend much of the next fortnight turned off there are still risks such as power surges, fire and theft etc. There’s even the risk of a virus creeping in when you turn things on when you return. So here’s some things to consider before you leave.

    Reset passwords

    The New Year is a good time to refresh passwords, so review what your key login details are and update them to stronger, more secure phrases. I personally like using phrases like a song or poem and dropping characters into the spaces so a password might look like: Mary$had$a$little$lamb

    You can make the passwords stronger by adding numbers and capitals as well.

    Staff turnover happens in all businesses and you may have forgotten to remove some former employees from your accounts when they left. The end of the year is a good time to review who has access to your cloud and remote access accounts.

    If you’re a social media user it’s also worthwhile checking what applications you’ve allowed to access your Facebook, Twitter or other online services. That mafia or farm game looks harmless, but often you’ve given it the right to post things and collect data from your account, so take off the ones you no longer find useful.

    Unplug everything

    Even when turned off, most modern computer equipment still has power running through its systems. This puts technology at risk during storms or brownouts. Printers, modems, routers, should all be turned off and disconnected from power and communications lines.

    Network, telephone line or cable connections should be unplugged – power surges can often affect phone and cable network connections. In fact you should unplug anything that connects your equipment to the outside world.

    Hide your equipment

    Give thieves as little temptation as possible. Electronic equipment has a high resale value and is easily moved. Lock away anything portable and draw the curtains or blinds in rooms where less portable equipment is kept.

    If you have an old laptop or mobile phone sitting around it’s not a bad idea to hide away the modern equipment and leave the old stuff in an obvious location. This is a variation on the old “leave ten dollars in the cash draw” ploy that gives thieves something without them ransacking the place. Don’t leave the sacrificial laptop in plain sight or you’ll be inviting break-ins.

    Backup

    One of the advantages with cloud computing is that many of your backup needs are taken care of. Unfortunately you still need your own local backups.

    In most offices not everything gets saved to the cloud and that information matters. For many small business years of work is sitting on the hard drive.

    External hard drives and DVDs are the most popular ways of saving backups. Your backup should include documents, email, address books, favorites and bookmarks.

    Store the backups away from the computer, preferably offsite. I recommend making two copies, leave one onsite for easy access and store one elsewhere. If something terrible happens to your home or office while you are away, your data is at least safe.

    For home offices, it’s a good idea to leave a copy of the backup with your neighbours or a relative in a nearby suburb. An old client of mine swaps external hard drives with his mother- in-law at church each week so he has a reasonably up to date copy of his data somewhere he knows he can get to.

    When you return

    Your computer is the very last thing you should turn on. Turn on modems, printers, external drives and network equipment before your computer. If you have a cable or ADSL Internet connection, give it a few minutes to connect before trying to log on.

    Update your system

    While you were away new Internet nasties in the form of viruses, Trojan horses and spyware will have come out and there’s a good chance some of them may be waiting in your inbox.

    Before checking emails or surfing the net, update your security software and check for any system updates. Don’t do anything on the net until everything is updated.

    Christmas and New Year are times when you should relax. There’s nothing worse than returning to find office equipment and valuable data lost. By backing up your systems and taking some precautions you don’t need to feel anxious about your business being up and running quickly when you get back to work.

    Enjoy your holidays and let’s all look forward to a great New Year.

    Similar posts:

  • Distrusting the cloud

    Distrusting the cloud

    The recent KPMG Convergence Report looking at online trends in the mobile web found that nine out of ten Australian consumers are concerned about the security of their online data.

    In light of recent corporate security breaches such as Sony’s and Telstra’s this is understandable which creates a real barrier for the adoption of cloud computing services.

    For cloud computing to be taken seriously, customers have to be certain their data and applications will be respected and protected.

    The corporate sector’s failure to hold senior management responsible these problems shows how big businesses largely aren’t taking user privacy or security seriously.

    This is a great opportunity for new businesses, we’ve already seen Amazon become the biggest host for cloud services over storage and Internet incumbents who five years ago would have dismissed Jeff Bezo’s company as a glorified book stand.

    For newer companies offering cloud services it’s a chance to build a culture where customer service, privacy and respect comes before management bonuses and perks. Where delivering what you promise is more than waving a vague Service Level Agreement (SLA) document under customer’s noses.

    As customers, big and small businesses have much to gain from cloud computing‘s productivity, collaboration and cost saving aspects but trust that data will be protected and the service will be available is essential.

    Before choosing a cloud service have a search of the web and popular forums to check what people are saying about the product.

    Don’t rely on fancy marketing, or assume that a big company will be better at protecting your data. The evidence is clear that smaller, newer companies are doing a better job at protecting data and ensuring business continuity than many of their bigger competitors.

    Over time, customers are going to get used to trusting cloud service providers and the businesses who’ll succeed in the online applications world are those who’ve been shown to be trustworthy.

    This is one way the web is changing the way we do business.

    Similar posts:

    • No Related Posts
  • The online business playground

    The online business playground

    This article originally appeared as The Business Playground on Smart Company.

    Last week, I was lucky to be invited to talk about digital citizenship with school kids and their parents in the Griffith area.

    The concept of “digital citizenship” is pretty simple – your behaviour online should be no different from how you’re expected to conduct yourself in the playground or business world.

    When talking to some of the parents about the issues their kids face, it stuck me just how seriously most of the concepts like being accountable for your behaviour, safe computing and avoiding bullying are as applicable as much to business as the schoolyard.

    Bullying in the workplace is pretty common and – as the tragic case of a young waitress who killed herself after being bullied at a Melbourne café shows – employers are directly responsible if they don’t control it.

    While the Melbourne case didn’t have a digital aspect, what employees put up about their co-workers on social media sites or on blogs or in emails can be bullying as well.

    Making things worse when social media or the web is involved is that most of the evidence is in writing and difficult to erase.

    Safe computing, such as creating strong passwords and not sharing them, is one important part of being safe online.

    Just as kids get into trouble by sharing their passwords with their friends, so too do businesses that common login details for their key systems and services.

    Some weeks ago there was the story of a Texas waterworks that was hacked because their systems had a simple password.

    No doubt the login was kept simple to make things easy for staff and management, just like a 12-year-old sharing their Minecraft or Moshi Monster accounts with their big brother or best friend.

    Being accountable for your behaviour is probably something both kids and business people struggle with; just as kids don’t understand that taunting their friends through a Facebook page has real life consequences, many managers and entrepreneurs forget that laws and professional standards apply online as much as they do in any other area.

    Of course in business, it’s not just ourselves that can cause problems – our staff can get us in trouble too. Employees need to know that upsetting co-workers, customers, suppliers and competitors is unprofessional and can cost them their jobs.

    Having a staff acceptable computer use policy makes it clear employees are responsible for work related comments they make even on their personal accounts outside of working hours is now essential for all enterprises.

    In many ways, business is just like being in the playground. It’s usually fun, but when things go wrong it can be painful in many ways.

    Just as schools are on the look out for digital trouble among students, watch out for similar pain points among your staff.

    Similar posts:

  • Securing the USB stick

    Securing the USB stick

    While I’m always reluctant to publicise security company’s media releases – believing many of them to be hysterical hype – a quick study by Sophos on lost USB keys has some interesting lessons for all of us who use thumb drives to carry data.

    Sophos bought 50 USB drives at Sydney’s CityRail unclaimed lost property auction and analysed them for malware and security risks.

    The study – not yet online – found more than 4,400 files including photos, CVs and job applications. Confidential material that could be used for identity theft, stalking or commercial advantage.

    Encryption

    If you are moving confidential data between computers, it may be a good idea to consider encryption software that protects files from unwanted visitors. Mac OS X has encryption software built in as does  all but the home versions of Windows 7 and Vista.

    Should you have a computer that doesn’t come with encryption, or you’re taking the drive between different venues, then you may need a third party encryption program like TrueCrypt. Note you’ll need administrator rights to install the software on every machine you use.

    The Malware threat

    As a security company Sophos leaned heavily towards the malware aspect with a headline that 66%, or 33, of the drives had some sort of malware on them.

    While that statistic is suspiciously high, it does illustrate the risk of plugging USB sticks into school, office and internet cafe computers. Like unsafe sex, the likelihood of catching something nasty increases with the more partners you have.

    Perversely Apple Macs could be helping spread the malware as Mac users generally don’t use or need anti virus sofware and any viruses picked up on someone else’s Windows system can sit undetected and dormant until they are used on another PC.

    Consequently, its good practice to wipe a drive when you’re finished with it so along with deleting malware you are also not keeping unnecessary and possibly out of date files on your drive.

    Overall, Sopho’s survey illustrates why cloud services like Dropbox and Box.net are best for sharing data although the USB stick still has an important role when everything else goes wrong.

    Similar posts: