BreachExchange mailing list archives
Cybersecurity, Personal E-mail Accounts and Personal Devices
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Tue, 22 Dec 2015 18:45:16 -0700
http://www.corpcounsel.com/id=1202745528820/Cybersecurity-Personal-Emails-Accounts-and-Personal-Devices?slreturn=20151122155724 In October, we learned that a hacker claiming to be a teenager had accessed the personal e-mail account of CIA Director John Brennan. WikiLeaks then published at least some of the e-mails. According to WikiLeaks, the published materials include a list of Brennan’s contacts and recommendations on dealing with Iran for “[w]hoever takes up residence at 1600 Pennsylvania Avenue in January 2009.” The previous month Hillary Clinton apologized for using her personal e-mail account while she was secretary of state, and The New York Times reported that some of the e-mails in question were classified as “Top Secret” by the CIA and National Geospatial-Intelligence Agency. In April 2012, the South Carolina government discovered that a Department of Health and Human Services employee had downloaded personal information about more than 220,000 Medicaid beneficiaries into his personal e-mail account. By now, we are used to the idea of hackers committing cyberattacks on businesses and the government. We assume, and expect, that businesses and government entities have in place reasonable cybersecurity measures to protect data. The above incidents, however, all involve situations in which an individual within an organization had either taken data from the secured environment and placed it in a presumably less secure environment, or initially created in an unsecured environment what might otherwise be organization data. The lesson that can be learned from these incidents is that hackers need not commit cyberattacks by navigating around what should be complex security measures within a business. They may simply target the personal e-mail accounts of individuals within the organization. Another lesson is that documents that would have been purged under the company’s document retention policy, had they been stored on the company’s system, may still exist on personal e-mail accounts. Consequently, they would be discoverable and may be subject to subpoena in a litigation or government investigation. If you have doubts about how old some retained e-mails may be, check your own personal e-mail account to see how many order confirmations for products purchased long ago remain in your folders. While we may be surprised that the secretary of state or CIA director has used personal e-mail for business purposes, there should be little surprise to hear that an executive at a corporation had done the same. In a world in which professionals are expected to stay plugged in 24 hours a day, the opportunities for hacking are abundant. In August 2014, hundreds of private photos of young celebrities—including many nude poses--were leaked following hacks in a phenomenon dubbed “Celebgate.” It was reported that 600 online storage accounts may have been breached by a single individual. Nine years earlier, Paris Hilton’s cell phone was hacked. The hackers obtained private photos, personal data and contact information of her friends and acquaintances. Eliminating the salacious aspects of these hacks, we are left with the fact that attacks on online storage accounts and personal devices, including smartphones, seem to require much less technological savvy than breaking into a corporation’s cyber environment. Such hacks, however, may yield rich harvests. Rather than intimate photos, hackers may easily obtain sensitive documents that executives have downloaded to their personal devices for reading at home (or on planes or trains). Similarly, some executives may use their personal storage accounts to access work-related documents from any location. Just as certain celebrities were targeted for hacking, individuals within a company who might have desired data may be targeted as well. These individuals, however, need not be generally well-known. They may be found by accessing a company directory. In fact, many companies feature the names, photos and job descriptions of personnel on the company websites. There is more to be learned from the celebrity hacks. Some hackers published material gathered from multiple hacks from different times. The lesson here is that a hack may take place long before the data is used by the hacker. Seemingly isolated and random incidents may be neither. And, in at least some instances, there does not appear to have been any attempt to profit financially from the celebrity hacks. Similarly, with the hack of a business, financial gain is not always the motive. The desire to cause embarrassment or simply self-gratification may be incentive enough to a hacker. The big question is: What can be done? There are far too many measures that companies should be taking to fit into this article. Here are just three simple suggestions to address the specific problem of employees failing to follow company policies to maintain cybersecurity. 1. Companies should train all employees in best practices for protecting data. The access to sensitive data likely is not limited solely to top executives. In fact, administrative and executive assistants as well as IT personnel conducting run-of-the-mill help desk functions at various times may have access to some of the most sensitive information at a company. Just as the best safety features on an automobile cannot prevent an accident if the driver falls asleep at the wheel or is texting while driving, the best technical cybersecurity measures cannot prevent a breach if an employee leaves behind his unlocked tablet at the airport, leaves her laptop open at a coffee house while she goes to the restroom or loses a thumb drive containing confidential information. The Los Angeles Times reported that, in 2013 alone, 4.5 million smartphones were stolen or lost in the United States. Thus, the importance of the company’s security measures must be stressed to all employees, including those who may feel so important that the general rules do not apply to them--and those who may feel so insignificant that no one would target them. 2. Companies should have periodic cyber check-ups. These should include gathering information from employees about how and when they create, access and store data. When they know the way the “on the ground” employees are working, companies are able to conduct better, more relevant training and decrease risks. 3. Companies should have systems and processes in place that allow employees to report suspected hacks. Companies must ensure that employees report all suspicious occurrences regarding all company and personal e-mail accounts, data storage accounts and devices on which company data is created, accessed or stored. In summary, strong technological safeguards are a must, but equally important is each employee playing a part in maintaining cybersecurity. Employees must appreciate and internalize their importance in this effort. No employee should put the security of the company’s information at risk just because it’s personally more convenient.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Cybersecurity, Personal E-mail Accounts and Personal Devices Audrey McNeil (Dec 23)