Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home CRM Systems Customer Service Business Intelligence Sales & Marketing More Topics...
Big Data
24/7/365 Network Uptime
Average Rating:
Rate this article:  
What Can IT Learn from the Target Breach?
What Can IT Learn from the Target Breach?

By Jennifer LeClaire
December 26, 2013 9:45AM

Bookmark and Share
Sensitive data like that stolen from the massive Target data breach should always be encrypted, segmented and carefully secured. A loss of such a late stockpile of cards indicates poor architectural and business process practices. Target is another name to add to the list of financial data breaches this year, though this could be one of the largest.
 


With the Department of Justice investigating the credit and debit card security breach at Target, IT professionals are also digging deeper into learnable lessons from what industry watchers are calling the second largest breach in U.S. history.

We turned to James Lyne, global head of security research at Sophos, for his thoughts on the breach, which led to the theft of about 40 million credit and debit card accounts between Nov. 27 and Dec. 15. Only the TJX Cos. scam took a heavier toll on customers, impacting about 45.7 shoppers in 2005.

“It is claimed to be data stealing code on the terminals handling transactions though details are scarce,” Lyne told us. “This means widespread deployment of malicious code across many terminals raising the question of how this made it through the build checks and whitelisting into Target’s standard. Even still, more details may come to light shortly but we should assume the worst.”

Encryption 101

According to Lyne, loss of the track information from the credit cards is particularly nasty as it can allow for card cloning. That said, he continued, just the cardholder’s name, card and security code has the potential for widespread online ordering fraud.

“Such sensitive information should always be encrypted, segmented and carefully secured,” Lyne said. “A loss of such a late stockpile of cards indicates poor architectural and business process practices -- though the full details of the root cause are not entirely known yet. Target is just another name to add to the list of financial data breaches this year, though this could be one of the largest yet.”

Lyne’s conclusion: It is critical that organizations handling such data take steps to protect it -- such large volumes of data should never be accessible by one user or process -- should be encrypted to segment the data and should be detected if an export of such size occurs.

Monitoring and Control

Kevin O’Brien, director of product marketing at CloudLock, is looking for the lessons going forward. From his perspective, as companies move their data into the cloud, the risk vector that most often receives little attention from internal security is around data and account security for the platforms in use, such as Google Apps, Salesforce, Box, and so on.

“There is a misconception that because the systems themselves are managed by the cloud vendor, security is a given. In the same way that Target should have been watching who had access to their POS terminals and what third-party apps were installed on it, organizations need to implement monitoring and control systems in their cloud environment,” O’Brien said.

“Know where your high-value data lives, and employ a defense-in-depth strategy whereby all access routes to that data are monitored automatically, ensuring that accidental or intentional exposure can be quickly detected and remediated,” he added.
 

Tell Us What You Think
Comment:

Name:

Ulf Mattsson :

Posted: 2013-12-27 @ 7:36am PT
I agree that it is important to “Know where your high-value data lives, and employ a defense-in-depth strategy ...”.

There are innumerable ways that data thieves can attack and penetrate your network. I think that "a defense-in-depth strategy" should secure the data itself and not only secure all access routes that data thieves can use. Every organization, especially those that handle card holder data, should operate under the assumption that sooner or later, they will be breached.

Monitoring is not enough and the new best practices to protect sensitive data and the data flow throughout the enterprise are designed with this assumption in mind. I recently read an interesting report from the Aberdeen Group that revealed that "Over the last 12 months, tokenization users had 50% fewer security-related incidents(e.g., unauthorized access, data loss or data exposure than tokenization non-users". The name of the study is "Tokenization Gets Traction".

Ulf Mattsson, CTO Protegrity



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Big Data
1.   IBM Targets Big Data with Power8 Line
2.   Hortonworks, Concurrent To Partner
3.   Mobile Ad Platform From Facebook?
4.   Facebook Rolls Out Friend Tracker
5.   Mark Hurd's 5 Keys to Market Success


advertisement
Data Compilers Peg Consumers
Sizing up with scores -- fairly or not.
Average Rating:
Fast Seagate 6 TB Drive for Data Center
Can use 12 Gb/s SAS interface.
Average Rating:
Police Keep Quiet About Cell Tracking
Tool called Stingray remains a mystery.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tech Giants Fund Initiative To Prevent Future Heartbleeds
Can more funding prevent Heartbleed vulnerabilities in future open-source software? A new Core Infrastructure Initiative at the Linux Foundation is attempting to find out.
 
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Business Intelligence | Sales & Marketing | Contact Centers | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.