The reality, cyber security experts say, is that however much they
spend, even the largest companies are unlikely to be able to stop
their systems being breached. The best defense may simply be either
to reduce the data they hold or encrypt it so well that if stolen it
will remain useless.
Only a few ago, the primary IT security concern for many large
corporations was stopping the loss or theft of physical disks or
drives with customer information.
Now, much harder to detect online thefts are rife.
Last week, Reuters revealed a host of big name U.S. Fortune 500
companies were on a hiring spree for board level cyber security
experts often offering $500,000-700,000 a year, sometimes more.
Many have high-level backgrounds, at much lower pay, at signals
intelligence agencies such as the U.S. National Security Agency or
Britain's GCHQ - although security experts say European firms are
reluctant to hire ex-NSA staff following revelations over the scale
of U.S. cyber monitoring by whistleblower Edward Snowden.
"Information has become toxic for retailers because the more they
have, the bigger a target they become," said Lamar Bailey, security
researcher at IT security firm Tripwire. "The ongoing rash of
attacks brings into question what information an organization should
be keeping."
U.S. retailer Target ousted its CEO Gregg Steinhafel in May after
the firm said foreign hackers had stolen up to 70 million items of
customer data including some PIN numbers late last year.
Industry watchers said purchases on its website dropped noticeably
in the run-up to Christmas with the breach also sparking lawsuits
and official investigations.
A report from cyber security think tank the Ponemon Institute showed
the average cost of a data breach in the last year grew by 15
percent to $3.5 million. The likelihood of a company having a data
breach involving 10,000 or more confidential records over a two-year
period was 22 percent, it said.
The corporate fallout from the largest recorded breach so far, the
loss of password data on some 145 million customers from online
retailer eBay, is not yet clear.
A senior eBay executive told Reuters last week that "for a very long
time" the firm had not realized customer data had been seriously
compromised by the attack.
ABORTION CHARITY FINED
Much smaller organizations, even charities, are also discovering
they have much to lose.
UK charity the British Pregnancy Advisory Service (BPAS) - which
provides information on abortions and runs clinics - is appealing a
200,000 pound fine after an anti-abortion campaigner was able to
access websites details of women asking for advice.
Britain's Information Commissioner said the charity had failed in
its responsibility to store records securely. "I do feel sympathy
for them," said Calum MacLeod, vice president for Europe, Middle
East and Africa at Lieberman Software Corporation. "They were never
going to be able to attract top IT staff and with their limited
resources, it will very often mean that they will outsource services
such as website development. This shows that great care must be
taken."
IT security experts say firms are becoming increasingly careful, now
sometimes instructing tens of thousands of users to change passwords
if even a single account appears compromised. Many are also taking
out specialist insurance.
[to top of second column] |
Still, a study of 102 UK financial institutions and 151 retail
organizations conducted earlier this year by Tripwire showed 40
percent said they would need 2 to 3 days to detect a breach.
A February report by BAE Systems Applied Intelligence, the cyber arm
of the British defense firm, showed customer data loss was by far
the largest IT security concern for firms in the United States,
Canada, Australia and Britain. It significantly outranked worries
over lost trade secrets and interruption of service.
Hackers seek the most complete range of information they can get on
individual customers. Obtaining a complete dataset of password, date
of birth, e-mail address, phone number and other personal data can
be more valuable than simple credit card details.
"The theft of financial information has a limited lifespan, until we
make changes the account details," said Andy Heather, vice president
for Europe, Middle East and Africa at Voltage Security. "The
personal information that can be obtained by accessing someone's
account profile has much broader use and can be used to commit a
much wider range of fraud."
Banks have been ahead of the curve when it comes to tightening IT
security and have suffered less than retailers in recent months.
Increasing numbers of firms are also using online payment operator
PayPal instead of taking credit card numbers themselves, reducing
the amount of data they hold.
The better data is encrypted, the less serious it is when it is
stolen though even some encrypted passwords can be cracked with
sufficient computer power.
Other strategies involve using "honeypots" - false folders designed
to look as though they contain valuable data - that can be used to
mislead and even detect attackers.
The most common route in for criminals, however, is gaining control
of someone else's user profile, allowing them to sneak into networks
and steal further data.
Some worry the high-profile nature of recent hacks may have actually
made such identity theft easier. Security experts report an increase
in "phishing" attacks - fake e-mails purportedly from major firms
mentioning recent security breaches and prompting people to a
dubious link to reset the password.
"Any time an event like this occurs it opens the door for phishing
campaigns to be more effective," said Troy Gill, senior security
analyst at AppRiver. "No organization is immune."
(Editing by Mike Peacock)
[© 2014 Thomson Reuters. All rights
reserved.] Copyright
2014 Reuters. All rights reserved. This material may not be
published, broadcast, rewritten or redistributed. |