The theft of approximately 3.6 million Social Security numbers and information on 387,000 credit and debit card accounts from government systems of the US state of South Carolina is yet another reminder that all IT operations should lock down their sensitive data by segmenting their networks, using better access controls, and regularly performing vulnerability assessments, security experts said.
On 26 October, the South Carolina Department of Revenue announced that attackers had breached its systems in September, following two previous attacks in August. The attacks exploited an unspecified vulnerability in the system, which the state agency closed on 20 October.
The online thieves who breached its network took a large amount of sensitive information on any taxpayers that had filed tax returns since 1998.
Millions of sensitive records have been taken from US government systems in recent months. In April, a hacker used a weak password to break into a server managed by the Utah Department of Technology Services and steal Social Security numbers and medical information on 780,000 people. In 2011, systems at Massachusetts’ Department of Unemployment Assistance and Department of Career Services were infected with a malicious program that may have taken sensitive data on 210,000 job seekers.
“If you think about it, a lot of our information is held by state and local governments,” said Anup Ghosh, chief executive of security firm Invincea. “Traditionally, they have lagged, but if you look at the data that they have, they really can’t afford to be behind.”
Private corporations have not done much better. In 2012, data-breach incidents have hit an all-time high, nearing 1,200 incidents, according to the Data Loss Database, an organisation that tracks publicly available information on a variety of breaches, from hacks to lost hard drives.
Companies as well as government agencies need to better limit access to data and ensure that any sensitive information is encrypted while stored. By segmenting networks to restrict access to only necessary personnel as well as cordon off malware from using an insider’s machine to steal information, companies and government agencies can be more certain that they are not leaking information. Finally, regular vulnerability scans can help find and close potential backdoors that could lead to a breach, as in the South Carolina case.
“Cases like this continue to raise awareness of the shortcomings of traditional infrastructure security in keeping sensitive data safe,” Mark Bower, vice president at data-protection provider Voltage Security, said in a statement on the Department of Revenue breach. “If data is not protected, it’s going to be breached at some point. And if an organisation can’t protect data wherever it goes, the data shouldn’t be on vulnerable systems that can put thousands of people’s identities at risk if compromised, lost or stolen.”
What do you know about Windows? Take our quiz.
Originally published on eWeek.
German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…
Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…
Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…
Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant
No skynet please. After the US, UK and France pledge human only control of nuclear…
Microsoft's AI investments continue in south east Asia, after investments in Japan, Malaysia, Indonesia, as…
View Comments
Governments, and especially small governments such as local councils are increasingly at risk of being hacked. The culture of prevention is just not in there yet despite all this issues. It's far cheaper to establish security measures (not only firewalls but security strategies and culture) than trying to repair damages.