Friday, 6 March 2009
Data Capture Protection
This is not the first time that sensitive information is assembled by a trusted third party so that other organizations can utilize it. Consider the credit industry – individual banks are unwilling to share information about their customers to competitors, but they are willing to share to a trusted third party who can combine others’ information and then provide a central credit reference check.
As I wrote above, despite the media attention, this I not a database attack. This incident was not caused by inappropriate use or release or leakage of data, but simply by the inappropriate data being collected in the first place.
Now if only we could find a Data Capture Protection system that was compliant with all possible data protection laws …
Tuesday, 24 February 2009
A New Dawn
I have just returned from spending time with my colleagues in the US to breaking news this morning of another huge breach of data at a credit card processing company. This comes within a few months of the record-breaking Heartland breach and the fast and furious RBS Worldpay loss of $9m within an hour.
Credit card security worries me on two levels and was brought straight to the front of my mind several times last week in restaurants, gas stations and stores.
At a corporate level, processors are clearly being targeted by highly effective criminal organisations who have recently been frighteningly effective with slow as well as fast attack strategies. What they all have in common, though, is that disclosure to the members of the public that their own data may have been compromised was late and seemingly reluctant. But at least it happened. There remain states in the US which, like the UK, still refuse to adopt breach disclosure legislation.
On an individual level, I was worried each time I offered up a credit card last week and it was taken from my sight. This makes data theft at the single card level possible and is a thing of the past in Europe, where terminals are brought to the customer and PIN numbers have replaced signatures. My card could have been swiped for duplication on a dozen occasions in New York and New Jersey last week in a way that would be impossible in Oxford today.
The overwhelming sense of promise I felt in the US gives me enormous hope though. President Obama has announced a $790bn stimulus package with $35bn set aside for IT. He also has earmarked $22bn for an integrated healthcare IT infrastructure – showing what a truly brave man he is, judging by the history of the UK challenges in this area.
Obama has a golden opportunity in troubled times. He is uniquely positioned to drive the US to a position of leadership on all matters around IT security. A land which so values the freedom of the individual should be taking the lead in ensuring that the citizen is informed quickly and fully whenever any of their data is compromised. Given that data theft is an international business - US financial and personal data is so often stored and processed off shore – then he needs to drive such regulations internationally.
I think he can lead these much-needed changes – and I believe he will.
Paul Davie
Monday, 16 February 2009
Physician heal thyself: Syringing a Database
It seems that whilst I was away “virtual syringes” have been used for both injecting (into SQL statements and web sites) and draining the lifeblood – not from a swollen knee joint – but the data from a corporation. This common “procedure” – like its human counterpart – if carried out with skill, is quite painless leaving the patient with no real idea as to how much has been extracted.
Having the contents of a database sucked out and sprayed over the Web is not a good thing – particularly if your business is security. It is a shame that this time the syringing operation was performed on a patient who should have known better.
Secerno's SynoptiQ powered DataWall ensures that every syringe is prevented from entering the skin!