How Your Data Can Get Loose
Ed Sperling, 11.21.08, 04:00 PM ESTThe ways in which your data can wind up in other people's hands is multiplying.
Locking up personal data is like putting a lock on your front door: It may deter some people, but professionals will break a window. If they really want to get in, they'll resort to more violent entries such as tunneling through the floor, smashing the walls or chopping a hole in the ceiling.
Nothing's different in cyberspace--except that the chances of getting caught are lower than in the physical world. In some countries, cyber-attacks aren't even illegal. And to make matters worse, it can be done remotely and hit many more victims with a single blow.
In Pictures: Protect Yourself From ID Theft
Ian odd bit of protection for the criminals: If a cyberhacker is based in country that doesn't make data snatching illegal, then he can't be prosecuted even if he preys on people elsewhere, notes John Stewart, chief security officer at Cisco Systems
That means protecting yourself--your identity, your company's data, even your health--becomes an imperative.
As more devices rely on software, malicious code has crept into surprising places. Buyers of Insignia electronic picture frames, for instance, got more than they bargained for last Christmas. The frames came pre-infected with a virus. Best Buy
"The number of attack vectors and techniques continue to multiply," says Josh Corman, principal security strategist at IBM
Significantly more dangerous is the possibility of infecting medical devices. (MIT was researching a piece of malicious code embedded into pacemakers.) "Imagine what would happen if you suddenly shut down all the pacemakers at the G8 Summit," Corman says. "There is a whole market for certified, pre-owned technology that comes pre-infected. It's a very attractive, bottoms-up infection method."
Conspiracy-minded technology developers have long sounded the alarm about technology backdoors--ways into data stored on devices that buyers never knew existed. Apple
And then there is the human element. Many crimes are inside jobs. And a networked corporate enterprise means every computer on the network--sometimes measured in the hundreds of thousands, with even more global access points--is potentially a way into private customer data or corporate intellectual property.
Banks, retailers and even local supermarkets have access to at least some personal information for customers, and some have far more access than they should have. And it doesn't take a top executive to, say, add an in-line keystroke monitor--a device no larger than the tip of your finger--on a device cord or a keyboard to record all the strokes. Alternatively, they can replace a mouse with one that has built-in memory. Security experts say this already is happening.
Dugg on Forbes.com
Employees can also become unwitting assistants for cyberhackers. IBM's Corman says one extremely successful trick among cyberthieves is to drop USB drives in a parking lot where workers gather to smoke. "They invariably grab it. 'Oh, a free USB. I wonder what's on it?' The penetration of these kinds of attacks is very high."
Some companies such as large banks have disabled USB drives as a security precaution. But employees may also take such "found" drives home, and they often log on to the corporate network from their home computers.
Simply sloppiness of employees can also endanger your private data. Overworked or careless employees can misplace a CD containing private information by leaving it in the pocket of an airplane seat or somewhere else outside of the corporation. The Bank of New York Mellon
Bottom line: Even those companies that do have a security policy may discover that their rules about who has access to data are not effective, particularly at a time when companies are laying off employees.
"The highest risk factor is the carbon-based units--humans," says Michelle Dennedy, chief data and privacy officers at Sun Microsystems
'Business' 카테고리의 다른 글
Stocks rally on Treasury secretary talk (0) | 2008.11.22 |
---|---|
Street's Rally Can't Lift Citigroup (0) | 2008.11.22 |
Meta Data: iPhone 2.2 (0) | 2008.11.22 |
Nokia Designs The Future (0) | 2008.11.21 |
Why Dell Can't Keep Up With HP (0) | 2008.11.21 |
Comment On This Story