Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Business Intelligence Sales & Marketing More Topics...
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Business Intelligence
Real-time info services with Neustar
Average Rating:
Rate this article:  
What Can IT Learn from the Target Breach?
What Can IT Learn from the Target Breach?

By Jennifer LeClaire
December 26, 2013 9:45AM

Bookmark and Share
Sensitive data like that stolen from the massive Target data breach should always be encrypted, segmented and carefully secured. A loss of such a late stockpile of cards indicates poor architectural and business process practices. Target is another name to add to the list of financial data breaches this year, though this could be one of the largest.
 


With the Department of Justice investigating the credit and debit card security breach at Target, IT professionals are also digging deeper into learnable lessons from what industry watchers are calling the second largest breach in U.S. history.

We turned to James Lyne, global head of security research at Sophos, for his thoughts on the breach, which led to the theft of about 40 million credit and debit card accounts between Nov. 27 and Dec. 15. Only the TJX Cos. scam took a heavier toll on customers, impacting about 45.7 shoppers in 2005.

“It is claimed to be data stealing code on the terminals handling transactions though details are scarce,” Lyne told us. “This means widespread deployment of malicious code across many terminals raising the question of how this made it through the build checks and whitelisting into Target’s standard. Even still, more details may come to light shortly but we should assume the worst.”

Encryption 101

According to Lyne, loss of the track information from the credit cards is particularly nasty as it can allow for card cloning. That said, he continued, just the cardholder’s name, card and security code has the potential for widespread online ordering fraud.

“Such sensitive information should always be encrypted, segmented and carefully secured,” Lyne said. “A loss of such a late stockpile of cards indicates poor architectural and business process practices -- though the full details of the root cause are not entirely known yet. Target is just another name to add to the list of financial data breaches this year, though this could be one of the largest yet.”

Lyne’s conclusion: It is critical that organizations handling such data take steps to protect it -- such large volumes of data should never be accessible by one user or process -- should be encrypted to segment the data and should be detected if an export of such size occurs.

Monitoring and Control

Kevin O’Brien, director of product marketing at CloudLock, is looking for the lessons going forward. From his perspective, as companies move their data into the cloud, the risk vector that most often receives little attention from internal security is around data and account security for the platforms in use, such as Google Apps, Salesforce, Box, and so on.

“There is a misconception that because the systems themselves are managed by the cloud vendor, security is a given. In the same way that Target should have been watching who had access to their POS terminals and what third-party apps were installed on it, organizations need to implement monitoring and control systems in their cloud environment,” O’Brien said.

“Know where your high-value data lives, and employ a defense-in-depth strategy whereby all access routes to that data are monitored automatically, ensuring that accidental or intentional exposure can be quickly detected and remediated,” he added.
 

Tell Us What You Think
Comment:

Name:

Ulf Mattsson :

Posted: 2013-12-27 @ 7:36am PT
I agree that it is important to “Know where your high-value data lives, and employ a defense-in-depth strategy ...”.

There are innumerable ways that data thieves can attack and penetrate your network. I think that "a defense-in-depth strategy" should secure the data itself and not only secure all access routes that data thieves can use. Every organization, especially those that handle card holder data, should operate under the assumption that sooner or later, they will be breached.

Monitoring is not enough and the new best practices to protect sensitive data and the data flow throughout the enterprise are designed with this assumption in mind. I recently read an interesting report from the Aberdeen Group that revealed that "Over the last 12 months, tokenization users had 50% fewer security-related incidents(e.g., unauthorized access, data loss or data exposure than tokenization non-users". The name of the study is "Tokenization Gets Traction".

Ulf Mattsson, CTO Protegrity



Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.


 Business Intelligence
1.   Mark Hurd's 5 Keys to Market Success
2.   Twitter Acquires Data Analyzer Gnip
3.   Silverpop: IBM Marketing Gets Personal
4.   Teradata Intros QueryGrid Analytics
5.   Tool Analyzes Tweets for Companies


advertisement
Twitter Acquires Data Analyzer Gnip
Company has been partner since start.
Average Rating:
Tool Analyzes Tweets for Companies
Customer satisfaction analyzed, rated.
Average Rating:
IBM Applies Big Data To Fraud Fight
Analytics enlisted to counter crime.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
IBM Offers Security, Disaster Recovery as SoftLayer Service
New disaster recovery and security services for SoftLayer clients are being added by IBM. Big Blue said the new capabilities will speed cloud adoption by alleviating concern over business continuity.
 
How To Beat the Heartbleed Bug
Heartbleed headlines continue as IT admins scramble for answers no one has. Early reports of stolen personal data, including 900 social insurance numbers in Canada, are starting to trickle in.
 
After Heartbleed, OpenSSL Calls for More Support
The president of the OpenSSL Foundation says more support is needed from companies and governments that use its software so that it can better spot and fix flawed pieces of code such as Heartbleed.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.
 

Mobile Technology Spotlight
Amazon 3D Smartphone Pics Leaked
E-commerce giant Amazon is reportedly set to launch a smartphone after years of development. Photos of the phone, which may feature a unique 3D interface, were leaked by tech pub BGR.
 
Zebra Tech Buys Motorola Enterprise for $3.45B
Weeks after Lenovo bought Motorola Mobility’s assets from Google for $2.91 million, Zebra Technologies is throwing down $3.45 billion for Motorola’s Enterprise business in an all-cash deal.
 
CTIA Caves, Volunteers Kill Switch Plan
After bucking against the concept of a smartphone kill switch, the CTIA just announced the “Smartphone Anti-Theft Voluntary Commitment” to thwart smartphone thefts in the U.S.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Business Intelligence | Sales & Marketing | Contact Centers | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.