Recent IT Security Articles that include actual security compromises of companies, corporations and government entities. Also, in most cases,provides the breakdown in regulatory and industry security monitoring/protection requirements.
Tuesday, December 09, 2008
Friday, December 05, 2008
Wednesday, December 03, 2008
Friday, November 21, 2008
Wednesday, November 19, 2008
Friday, November 14, 2008
Thursday, November 13, 2008
Monday, November 10, 2008
Friday, November 07, 2008
Thursday, November 06, 2008
Wednesday, November 05, 2008
Tuesday, November 04, 2008
Monday, November 03, 2008
Friday, October 31, 2008
Thursday, October 30, 2008
Wednesday, October 29, 2008
Tuesday, October 28, 2008
Tuesday, October 21, 2008
Monday, October 20, 2008
Monday, October 13, 2008
Tuesday, October 07, 2008
Monday, October 06, 2008
Wednesday, October 01, 2008
Tuesday, September 30, 2008
Monday, September 29, 2008
Thursday, September 25, 2008
Wednesday, September 24, 2008
Wednesday, September 17, 2008
Tuesday, September 16, 2008
Monday, September 15, 2008
Thursday, September 11, 2008
Tuesday, September 09, 2008
Monday, September 08, 2008
Friday, September 05, 2008
Thursday, September 04, 2008
Wednesday, September 03, 2008
Tuesday, September 02, 2008
Friday, August 29, 2008
Thursday, August 28, 2008
Wednesday, August 27, 2008
Tuesday, August 26, 2008
Monday, August 25, 2008
Friday, August 22, 2008
Tuesday, August 19, 2008
Monday, August 18, 2008
Friday, August 15, 2008
Wednesday, August 13, 2008
Monday, August 11, 2008
Thursday, August 07, 2008
Wednesday, August 06, 2008
Tuesday, August 05, 2008
Monday, August 04, 2008
Thursday, July 31, 2008
Wednesday, July 30, 2008
Tuesday, July 29, 2008
Monday, July 28, 2008
Friday, July 25, 2008
Wednesday, July 23, 2008
Tuesday, July 22, 2008
Monday, July 21, 2008
Friday, July 18, 2008
Thursday, July 17, 2008
Tuesday, July 15, 2008
Monday, July 14, 2008
Friday, July 11, 2008
Thursday, July 10, 2008
Tuesday, July 08, 2008
Monday, July 07, 2008
Wednesday, July 02, 2008
Monday, June 30, 2008
Monday, June 23, 2008
Monday, June 16, 2008
Friday, June 13, 2008
Thursday, June 12, 2008
Tuesday, June 10, 2008
Monday, June 09, 2008
Friday, June 06, 2008
Thursday, June 05, 2008
Tuesday, June 03, 2008
Monday, June 02, 2008
Friday, May 30, 2008
Tuesday, May 27, 2008
Wednesday, May 21, 2008
Tuesday, May 20, 2008
Monday, May 19, 2008
Protecting data from danger
Pittsburgh Business Times - by Kim Lyons
Dawn Cappelli isn't that scary.
But listen to her talk about her job as head of the Insider Threat Team at the Computer Emergency Response Team, part of the Software Engineering Institute at Carnegie Mellon University, and she becomes downright terrifying.
"I'm so paranoid," Cappelli said. "I try to tell people that their information isn't safe, because so many people have access to it."
Gone are the days when a company's biggest information concern was whether employees were downloading the wrong e-mail attachments. Whether it's big department stores unable to protect customers' credit card information, or smaller firms losing track of who has access to proprietary information, the threats to companies' sensitive data are constant and ever-changing.
And the long-term effects of a data breach can have an impact on a company well after the issue has been resolved, whether it's a loss of customers, or damage to the company's reputation.
Bill Shore, supervisor of the FBI's Computer Crimes Squad in Pittsburgh, said the days of hackers seeking fame and glory -- think of the "iloveyou" virus of 2000 -- are mostly over.
"Now, they try to keep under the radar," Shore said. "They are much more profit-motivated. They're trying to find ways to get access to money."
STEALING FROM THE INSIDE
Today, more threats to companies' data come from within, Cappelli said, as some employees deliberately take sensitive information.
Many are seeking personal gain from the sale of company or customer information. In this instance, the typical insider is in a fairly low-level position, the average age is 33 and offenders come from both genders. These insiders don't have to be particularly technical, but most are relatively low paid, Cappelli said. Such insiders are sometimes approached by someone from outside the company to steal the sensitive information, she said.
Another problem is industrial espionage, where employees steals trade secrets, often when they're about to start their own company, Cappelli said. In these cases of theft for personal gain, about 71 percent of them are very technical people, who have access to new strategies or projects being developed. And, in her experience, they're male, with an average age of about 37.
A large part of the problem is the attitude of upper-level management, Cappelli said.
"This isn't something that can be just handed off to the IT department," she said. "It's difficult to watch all your employees all the time, but companies need to recognize when people are acting suspiciously."
BREAKING AND ENTERING
Inside jobs are far from the only thing that business owners have to worry about when trying to keep critical information safe.
Identity theft is huge, and not just for individuals, Shore said. He's seen phishing attempts -- where hackers try to get users to divulge sensitive information like bank account numbers -- targeted at company CFOs. Such phishing scams can potentially drain millions of dollars from a company's coffers.
Even worse, he said, are malicious programs that record keystrokes -- all the program has to do is watch for activity on a bank account Web site, and it records account numbers and password information.
Savvy companies recognize the potential threats to their customer information and other sensitive data.
John McClelland, president of Strip District-based online produce supplier Good Apples LLC, said since 90 percent of his company's business is conducted on the Internet, he protects customers' credit card information by not storing any of it. Every time a customer places an order, they must re-enter their credit card number.
"Yes, it makes it a little less convenient for customers, but we don't have the amount of money we would need to invest in security to protect that information," McClelland said. "It would be irresponsible for us to store it."
Bruce Freshwater, CEO of Robinson-based Sierra w/o Wires Inc., an IT services company, said unfortunately many companies don't want to invest in protecting their critical data until after they've had a breach.
"Ninety-five percent of the time, they don't want to expend any money until after the data has been compromised, and they've taken a $100,000 loss," Freshwater said.
Sierra's own security includes an IPS, or intrusion protection system, at its network perimeters. It guards against the kinds of internal threats that Cappelli described by assigning controls based on access requirements; the sales team can't access IT information, for instance.
FUTURE THREATS HARD TO PREDICT
James Joshi, an assistant professor at the school of information sciences at the University of Pittsburgh, said he tries to avoid predicting the future.
"But I think -- or rather, fear -- more sophisticated, coordinated multi-attacks may be the next thing that the hackers will come up with," he said. "There is already significant issues with botnets indicating this. And in most cases, organizations and systems are not that well-prepared against such cyber events."
Botnets are programs that run automatically on "zombie" computers -- a machine that's been infected with a Trojan horse or other virus or worm -- and are controlled remotely, by someone usually up to no good.
Shore said the biggest threat he sees on the horizon is the increased use in peer-to-peer, or file sharing, networks. And with economic espionage becoming more and more lucrative, Shore said, ID theft is likely to become more prevalent for both individuals and companies.
Cappelli's colleague at CERT, Nick Ianelli, specializes in malware trends and analyzing future threats. He said the potential for data compromise via instant messenger programs is becoming bigger and bigger. Social networking sites are also an area where user information is highly vulnerable, he said.
And, Ianelli said there's also a lot of malicious code that works on cell phones. Since different cell phone manufacturers use different operating systems, it's hard to create one threat that works in the vast majority of devices.
"But once that gets on a machine, it can compromise all the data on there," he said. "Anytime you plug in your phone, you provide access to it."
klyons@bizjournals.com (412) 208-3827
All contents of this site © American City Business Journals Inc. All rights reserved.