Security Market Segment LS
Monday, 05 May 2014 15:24

The human factor puts data privacy at risk Featured

By
MIchelle Dennedy, Chief Privacy Officer McAfee MIchelle Dennedy, Chief Privacy Officer McAfee

Human error has been identified as the key vulnerability of cyber security and a major threat to data privacy, according to the security chief of one global security firm.

Michelle Dennedy, the Chief Privacy Officer at McAfee – part of Intel Security – says the top three threats to customer privacy this year – targeted point-of-sale malware attacks, software coding errors and internal misuse of customer information – are in “whole or part the result of human interaction with security systems”.

Dennedy, author of The Privacy Engineer’s Manifesto - currently visiting Australia during Privacy Awareness Week - says that data privacy must be built into operational systems and data management policies to mitigate the key vulnerability of cyber security – humans.

According to Dennedy, even the most comprehensive security system has its flaws, most notably human errors or choices that make security processes less robust and result in a loss of customer privacy.

“We live and work in a digital, IP-connected world where privacy and security vulnerabilities cannot be completely programmed out. That being said, the best course of action is to plan for the eventuality of errors by building a privacy infrastructure that places protecting customer data at its heart, and provides clear policies and guidelines for employees who are in charge of managing this type of information.

“We’ve seen three recent types of vulnerability which could happen to any business that stores customer account and financial details, and in each case there’s been an important lesson to learn about respect for customer privacy.”

Dennedy says the retail sector, in particular, has seen a spike in attacks on point of sale (POS) systems as cyber criminals recognised an opportunity to exploit an area where there has been “little effort to secure customer data”.

“We’ve found that retailers are falling into a ‘security by obscurity’ trap – they mistakenly believe that their POS system is so customised to their particular business requirements that it would be too difficult for hackers to bypass the controls and access the system,” Dennedy warns.

“In fact, most use fairly standard systems and processes and it is relatively easy for criminals to gain access to customer account and credit card details. Many hackers are using fairly unsophisticated off-the-shelf malware to perpetrate a successful attack.”

According to Dennedy, some recent data breaches have occurred despite the security system identifying an attack, because the security team ignored or overlooked critical alerts.

“Businesses can invest in state-of-the-art security platforms designed to prevent cyber attacks and data breaches, however, the security managers and executives need to recognise the problem and take action to protect their customers.”

Dennedy stresses that cyber risks are not only external to the business, and that a key threat to data security is from employees, suppliers and third parties who either maliciously or accidentally misuse or have an inappropriate level of access to sensitive customer data.

She makes the point that internal data leakages are almost always the result of human error, either from the person handling the customer data, or those in charge of writing, implementing and enforcing the data handling policies or setting access restrictions to sensitive data on the server, including those who no longer work for the company.

“With consumers becoming more aware of their digital footprint and the value of their privacy, these types of vulnerabilities within an organisation’s processes and systems are taken seriously. The changes to the Australian Privacy Laws have helped everyone realise and respect that data is not just data, it’s information on human beings.

“What we are aiming for is privacy by design, where businesses think about what their customers would expect from them and use that as a starting point for building a privacy framework. We call this ‘privacy engineering’ where customer privacy protection practices are embedded into every aspect of the business and at every level of employee, and that means all staff - current and past.”

Dennedy  also has something to say on “coding glitches”, highlighting the Heartbleed vulnerability in OpenSSL which she says poses “one of the most formidable security and privacy concerns in recent memory given attackers manipulating it could have eavesdropped on communications, stolen data directly from services and users, or impersonated services and users.”

“What we’ve seen is a human error in the coding of the software, but as this particular technology standard is not very user- or administrator-friendly, the OpenSSL has been implemented poorly in many cases, creating an even broader problem for businesses.

“Technology developers must go further by building privacy controls into their products at their genesis, rather than attempt to bolt it on to technology as an expensive afterthought with risk-liability implications,” Dennedy concludes.


BACK TO HOME PAGE

NEW OFFER - ITWIRE LAUNCHES PROMOTIONAL NEWS & CONTENT

Recently iTWire remodelled and relaunched how we approach "Sponsored Content" and this is now referred to as "Promotional News and Content”.

This repositioning of our promotional stories has come about due to customer focus groups and their feedback from PR firms, bloggers and advertising firms.

Your Promotional story will be prominently displayed on the Home Page.

We will also provide you with a second post that will be displayed on every page on the right hand side for at least 6 weeks and also it will appear for 4 weeks in the newsletter every day that goes to 75,000 readers twice daily.

POST YOUR NEWS ON ITWIRE NOW!

INVITE DENODO EXECUTIVE VIRTUAL ROUNDTABLE 9/7/20 1:30 PM AEST

CLOUD ADOPTION AND CHALLENGES

Denodo, the leader in data virtualisation, has announced a debate-style three-part Experts Roundtable Series, with the first event to be hosted in the APAC region.

The round table will feature high-level executives and thought leaders from some of the region’s most influential organisations.

They will debate the latest trends in cloud adoption and technologies altering the data management industry.

The debate will centre on the recently-published Denodo 2020 Global Cloud Survey.

To discover more and register for the event, please click the button below.

REGISTER HERE!

BACK TO HOME PAGE
Peter Dinham

Peter Dinham - retired and is a "volunteer" writer for iTWire. He is a veteran journalist and corporate communications consultant. He has worked as a journalist in all forms of media – newspapers/magazines, radio, television, press agency and now, online – including with the Canberra Times, The Examiner (Tasmania), the ABC and AAP-Reuters. As a freelance journalist he also had articles published in Australian and overseas magazines. He worked in the corporate communications/public relations sector, in-house with an airline, and as a senior executive in Australia of the world’s largest communications consultancy, Burson-Marsteller. He also ran his own communications consultancy and was a co-founder in Australia of the global photographic agency, the Image Bank (now Getty Images).

BACK TO HOME PAGE

Webinars & Events

VENDOR NEWS

REVIEWS

Comments