Guest Perspective: Big Data Means Big Opportunities for Cyber Criminals

Posted

A cyber-attack on the Louisiana Office of Motor Vehicles (OMV) has exposed the private information of approximately six million drivers. This breach may lead to a large class-action lawsuit, as indicated by court filings.

At the same time, navigating today’s complex regulatory landscape surrounding data protection can feel like a maze. Hefty fines, reputational damage, and legal repercussions await those who make a wrong turn. But organizations that partner with an experienced Cyber Security firm can reduce the risk of falling into such traps.

As New Orleans CityBusiness previously reported, state officials believe that in the OMV attack, all Louisianians with a state-issued driver’s license, ID card, or vehicle registration had their sensitive personal information exposed — including their name, Social Security number, address, birth date, and driver’s license number.

The proposed class action lawsuit alleges the software company storing OMV data was hacked because they did not test their products enough. They also did not fix vulnerabilities or take steps to remove threats, failing to take the necessary steps to patch or eliminate threats.

Businesses and public organizations are targets because they are increasingly using big data. They use it to provide personalized services, drive innovation, and shape their business strategies — but they have a legal and ethical responsibility to keep sensitive data safe. Business leaders cannot afford to underestimate or under-resource the role of Cyber Security in protecting personal data.

The average business or municipal organization manages an astonishing amount of personal data. As the OMV hack demonstrated, this may include names, Social Security numbers, and other identifiers.

People who provide personal information during business transactions naturally expect organizations to protect that data from unauthorized access and evolving cyber threats, while an increasingly complex regulatory environment means high stakes for business leaders. To stay ahead, companies must revolutionize their Cyber Security efforts.

And personal data collection continues to grow quickly. Sensitive information is stored in different places and formats, because of the rise of mobile devices, the Internet of Things, and online services. So to protect it, security teams need to know where data lives and where it travels.

All this personal data represents a highly valuable commodity for Cyber Criminals. Hackers continue to use ransomware and phishing attacks, and they are discovering new methods to bypass security measures. One way they are doing this is by utilizing such AI tools as deepfakes.

Meanwhile, complex privacy regulations enacted at the industry, state, and global levels set stringent standards for data protection. Companies must be able to demonstrate that they have taken steps to prevent unauthorized access and data breaches.

For example, most privacy laws require organizations to conduct regular risk assessments and implement “reasonable security procedures” to protect personal data. Additionally, they typically require companies to develop and maintain plans for responding to data breaches and Cyber Incidents.

Organizations that implement Cyber Security best practices help to ensure their regulatory compliance, while enhancing consumer trust. Creating a strong compliance program takes time and can be overwhelming, but focusing on basic security measures is a good start. For example:

Data Encryption

Encryption serves as a critical barrier against data theft. You probably know that data should be encrypted both at rest and in transit. However, not all encryption methods provide the same protection. Security teams may need to update encryption, particularly for the most sensitive data.

Regular Risk Assessments

Security audits and risk assessments help organizations achieve regulatory compliance. More importantly, they highlight vulnerabilities, guiding security teams in creating a security strategy and identifying priorities.

Patch Management

Poor patch management leaves the door open for hackers to expose known vulnerabilities. Keep systems and software updated with the latest security patches, automating the process where possible.

Review and Update Access Controls

Strengthen password policies and implement multi-factor authentication for an additional layer of protection. Ensure that employees and vendors have only the access they need to do their job.

Invest in Quality Security Awareness Training 

95% of successful Cyber Attacks result from human error. Target training to employees’ specific circumstances for maximum results.

Develop an Incident Response Plan

Have a well-defined response plan in place to ensure quick action and mitigation in the event of a data breach.

Carefully Monitor Contracts with Service Providers and Other Third Parties

Look for stipulations requiring vendors to maintain reasonable security practices regarding sensitive data. Also, know and monitor all points through which third parties access company networks and data.

Cyber Security is important for protecting personal data and requires commitment from everyone, not just IT. Small organizations that struggle to hire security experts internally can benefit from partnering with security experts.

Businesses benefit from having a dedicated Cyber Security provider at the table, offering enterprise-grade solutions to complex problems. Organizations can gain control of their data and protect sensitive information by consulting with information experts.

Companies can reduce the risk of successful hacking by partnering with experienced third-party Cyber Security experts who can assist with employee training, ongoing compliance, and security monitoring. By working with experts, companies can reduce the likelihood of successful hacking.

 

 

Carl Mazzanti is president of eMazzanti Technologies in Hoboken, NJ, providing IT Consulting and Cyber Security Services for businesses ranging from home offices to multinational corporations.

News, Technology