September 22, 2017

With Big Data Comes Responsibility: Avoid Becoming Breach Target

By CloudTweaks

Avoid Becoming a Data Breach Target

Practically every industry relies on Big Data, from education, government, and healthcare to banking, manufacturing, and retail. With the rise of Big Data over the last ten years and the significant increase in cyber security threats over the last two, the opportunities for both business and cyber criminals are growing exponentially. This means that information security is more important than ever. Businesses need to stay one step ahead if they want to avoid becoming the next target of a big breach.

According to an article published by the Master of Science in Cyber Security Department at the University of San Diego, “Just as big data has opened up new possibilities for cyber security teams, it has also given cyber criminals the opportunity to access mass quantities of sensitive and personal information through the use of advanced technologies.

Data breaches increased by 40% between 2015 and 2016 and the trend continues in 2017. This is for bad for consumers and bad for business. Identity theft costs the average victim $1,343 in stolen assets and expenses like legal fees, which can be a lot for the average consumer. According to a new report and timeline just released, these are the worst data breaches over the last ten years, how they happened, and what businesses can do to avoid the same fate.

The Biggest Data Breach (most records)

  • Who: River City Media, an email marketing company known for sending spam emails
  • When: January–March 2017
  • How: It was an accident. Backup databases were not configured correctly and were left available online for anyone to see
  • Number of records: 1.37 billion!
  • Type of records: Email accounts, full names, IP addresses, and physical addresses
  • Business Consequences: They were dropped from Amobee’s affiliate service, which was one of the largest marketing firms working with them

Most Serious Data Breach (most sensitive information exposed)

  • Who: Equifax, one of 3 major credit reporting agencies in the US
  • When: 2017, mid-May through July
  • How: A security patch needed to fix a flaw in their Apache Struts tool was not updated promptly, which left their system vulnerable and allowed hackers to gain access
  • Number of records: 143 million! Nearly half of the US population
  • Type of records exposed: Birth dates, names, Social Security numbers, driver’s license numbers, addresses, and credit card numbers. Ouch
  • Business Consequences: The chief information officer and chief security officer were forced out; they are facing a federal investigation, and their shares have dropped at least 35% since the breach was announced. They will most likely face a lawsuit involving millions of angry customers

Most Financially Damaging Data Breach (biggest financial loss)

  • Who: American Business Hack. This data breach affected multiple companies from different sectors, including Nasdaq, Visa, JCPenney, Dow Jones, JetBlue and 7-Eleven.
  • When: 2005 to 2012. A large portion of the records were stolen during the economic downturn between 2008 and 2009
  • How: A sophisticated hacking ring targeted banks, payment processors, and chain stores over eight years using malware to gain access to accounts, withdraw money, and steal and sell information. They disabled antivirus software and used anonymous web-hosting services to hide their activities
  • Number of records: 160 million credit and debit card numbers stolen and 800,000 bank accounts breached
  • Type of records: Credit and debit card numbers
  • Business Consequences: At least $300 million in losses

Cyber Security Threats:

  • Evolving ransomware
  • Malware and social engineering like phishing scams
  • Expired SSL Certificates
  • RoT (Ransomware of Things)
  • Legacy IT systems obtained through acquisition of other companies
  • Below Average IP Reputation scores

How to Avoid Becoming a Target:

  • Keep your software up to date, make sure any open source software being used is secure, and install security patches promptly
  • Use encryption on all your company devices to protect against a breach in the event it gets stolen
  • Improve overall network and application security and keep them up-to-date
  • Implement cloud-based continuous monitoring systems that assess Vulnerabilities in real time
  • Create a vendor management program to monitor third party vendors and catch threats before they can take control of the system
  • Train staff to identify malicious attacks so they don’t accidentally share information with scammers
  • Classify your data so you know where all the sensitive information is stored and have proper controls in place to protect it from falling into the wrong hands

Advice for Consumers:

  • Make sure your devices are password protected.
  • Invest in credit monitoring and identity theft protection to protect yourself in the event of a data breach
  • Create strong passwords—keep your information close, and only give it out when absolutely necessary

Other considerations:

IOT

According to Anatoliy Okhotnikov, Head of Engineering for Softjourn, “in the world of IoT, our most sensitive data is now everywhere, and we have another channel to leak our personal information. Attackers will target consumer devices from your connected fridge to game console. And do not forget that everything is mobile today, so mobile security is one of the main areas to consider as well.”

Financial Services

According to John Farley, Cyber Risk Practice Leader for HUB International, “New York has traditionally led the way in regulating the financial services sector’” and with the new cybersecurity requirements that went into effect in March of this year, approximately 3,000 financial institutions, including banks, insurance companies, and other institutions will be required to:

  • Establish a cybersecurity program;
  • Adopt a written cybersecurity policy;
  • Designate a Chief Information Security Officer, or similar individual, responsible for implementing, overseeing and enforcing its new program and policy;
  • Create a vendor management program to ensure the security of their information systems;
  • Establish an incident response plan to respond to and recover from a cybersecurity event;
  • Implement a variety of additional controls, including annual penetration testing, multi-factor authentication procedures, encryption standards, data access limitations, formal log audit programs and data destruction.

It is likely that other states will follow suit.

Conclusion

Overall, Big Data provides numerous opportunities for businesses to grow and thrive, including the ability to increase cybersecurity protections. At the same time, this provides more opportunities for cybercriminals to identify and take advantage of vulnerabilities across systems. With Big Data comes big responsibility. As a company or institution using it, you have to be willing to accept the risks involved and ensure your company is doing everything possible to implement the highest level of security from your security protocols, network systems, and connected devices to hardware, software and applications.

By Krystal Rogers-Nelson

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information, resources and thought leadership services. Contact us for ways on how to contribute and support our dedicated cloud community.
Cloud Computing Humor
Khurram Mir

How AI Enhances Cybersecurity: Expert Insights from Khurram Mir of Kualitatem

How AI Enhances Cybersecurity Khurram Mir, the Chief Marketing Officer at Kualitatem, brings a profound [...]
Read more
Mark Rochester

Episode 23: The Missing Link in Migration Work

Active Directory Migration Performing an Active Directory migration to the cloud can be quite an [...]
Read more
Bright Data

10 Leading Proxy Services: Enhancing Your Online Security and Privacy

10 Leading Proxy Services In the realm of digital technology, proxies emerge as critical tools, [...]
Read more
finOps-tech

Cloud FinOps in the Age of AI: Key Trends

AI Era: Key Trends in Cloud FinOps Cloud FinOps goes beyond simply saving money on [...]
Read more

5 Azure Cost Management Strategies

What Is Azure Cost Management? Azure cost management refers to the practices and processes that [...]
Read more
Nicos Vekiarides

AI, Deepfakes, and Digital Trust: A Conversation with Nicos Vekiarides

AI, Deepfakes, and Digital Trust In an insightful interview with CloudTweaks, Nicos Vekiarides, CEO and [...]
Read more

SPONSOR PARTNER

Unlock the power of Google Cloud with a $350 signup credit. Experience enhanced scalability, security, and innovation for your projects today!
© 2024 CloudTweaks. All rights reserved.