Itay Glick (below, right), chief executive of Israel-based Votiro, told iTWire in response to queries that there was a difference between between using old technology and applying bad security practices. This was after iTWire pointed to published evidence that Deloitte was using rather old technology.
The news of the Deloitte breach came to light on 25 September when The Guardian published a detailed report. The company is yet to make a public statement even though the breach is said to have occurred last year and discovered in March this year.
"While I can’t say with certainty what technology and solutions they were (and are) using, I can say that their security practices are outdated and need to improve," Glick said. "As with similar mega breaches that happened during 2017, bad security practices paved the way for attackers rather than sophisticated exploits."
"I don’t have specific details (other than what has been reported online) of the attack," Glick told iTWire. "If the reports are accurate and the attackers got in using stolen administrator credentials, it makes no difference if the platform was of Microsoft, Google, Amazon etc. Stolen credentials will work anywhere (assuming no 2FA is applied, which happens to be the case)."
But he was quick to agree that Deloitte's apparent policy of remaining close-mouthed about the breach was not the way to tackle such an incident.
"In my view, public disclosure is the best way to deal with these types of things," said Glick whose company has been in business for the last seven years and counts a number of big global businesses among its clients.
"When important things are left in the dark, it usually implies that there is something to hide. When it’s regarding customer data and private information that has been leaked, more secrets cannot do any good."
He said iTWire's assertion that customers were likely to be tied to the firm not merely due to the quality of its business solutions would not hold good when it came to matters of trust.
"As with anything else that requires trust – once it has been eroded, so will customer confidence in the company. Would you keep your money in a bank that’s been known to have security issues? Would you go to a doctor that’s been known to have hygiene problems?" Glick asked.
It was pointed out to Glick that in some Deloitte offices, the ports 445 and 139, common points of attack in Microsoft systems, were exposed to the Internet, and this did not seem to suggest that Deloitte knew a great deal about security.
His response was that security is a matter of actions. "They might know a great deal about security, but they've done very little to make sure they and their vast amount of data are safe, and so it backfired," he said.
"The tip is, which applies to everyone from private people to corporations, don’t wait on security. Most will try to get things going and deal with security later on, but the problem is that often once things are up and running, people will move on to the next item on the list and never deal with security issues."
Glick said security was an ongoing process of staying on top of things, and knowing what hardware, firmware and software were in use, updating and patching regularly and staying up-to-date with current events.
"Embracing the warm feeling of 'it won’t happen to me' is a risk, and the bigger you are the more you have to lose."