Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 27 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Why no data is OK to lose

by The Gurus
October 3, 2014
in Opinions & Analysis
Share on FacebookShare on Twitter

2014 has been a pretty brutal year for data breaches and hack attacks.
 
From eBay to Spotify and back again, it feels like there has been a total avalanche of data being pinched from under the noses of the companies that we have trusted to keep our information safe.
 
What astounds me, even more than the fact that companies don’t seem to be learning any lessons, is that the default response when an attack is revealed is that ‘no financial information has been compromised’. Clearly that is a good thing. No one can argue against that. However the fact that my personal information has been stolen and is most likely for sale on the deep web, is not a good thing. Far from it.
 
Whilst the online giants I interact with treat my email address, date of birth, address and name with little respect, there is a hacker somewhere that will pay a princely sum for them. These details might seem sparse and unimportant, but they can easily be used to assume an individual’s identity.
 
Not sure? These details would be all someone would need in order to set up a utility bill in your name, secure a mobile phone contract and register for a whole host of services. There is a story about a couple who once found out that their identity had been stolen when they ran into the post man who said that he would be sorry to see them leave the neighbourhood. Puzzled they asked what he meant. To which the postman replied: ‘Well you’re moving aren’t you? We’ve had a forwarding request down at the office’. Unbeknown to them, their identity had been stolen and their house sold from underneath them. It might sound implausible, but it can – and has – happened.
 
Translate that into the digital world and the stakes are significantly upped. We have so many different profiles that it can be hard to keep track of them all. This creates a window of opportunity for someone with malicious intent to capitalise on. Whilst your CVC number might not have been stolen, what are you most concerned about – that (where in the majority of cases the banks have processes in place to recoup your losses) or your Facebook log in being stolen? For a lot of people it would most definitely be the latter. Our social profile is in many ways to set of virtual keys to our lives.
 
These are just a few examples of how the information deemed OK to lose can be used and abused by those that manage to get their hands on it. When it comes to our data there shouldn’t be two tiers of protection, all data should be protected equally and with the same level of diligence.
 
This might seem idealistic. After all, you could argue that if a hacker has attacked and made off with personal data – which I have made the case for being extremely valuable – will they come back? Yes. Of course they will. It is naïve to think otherwise.
 
As breaches become more common place, so it is becoming clear that there is a lack of governance around data security. Target was warned about a potential breach by one of its security vendors systems, but ignored it until the US Government informed them about suspicious traffic leaving its network. It was a similar scenario with Home Depot.  And eBay’s latest redirect attack required the BBC to apply the pressure in order for anything to happen.
 
The bigger issue here is trust. Online giants such as Amazon, eBay and Spotify exist and make money not just because they had a neat idea, but because we deem them as trustworthy to transact with. We trust them with a huge variety of data.
We also trust them to keep it safe. This is a duty that should be taken seriously. The information we share with these companies isn’t theirs; it’s ours. They have a responsibility to be more rigorous and proactive because no matter what they might think, no data is OK to lose.
 
 
 
Charles Sweeney is CEO of Bloxx

FacebookTweetLinkedIn
ShareTweet
Previous Post

17,000 enslaved in botnet which used Reddit server

Next Post

Researchers detect new and improved Cryptowall ransomware

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information