The Day

Cyber insecurity has to be addressed

- By JOHN LAPRISE John Laprise, Ph.D., began studying global Internet policy and governance with his work on cyber warfare doctrine in 1993. Since then, he has taught and written in many areas of cyber strategy including surveillan­ce and protecting intellec

The alarm bells are getting louder. #SonyHack, #HackingTea­m, #OPMHack, and now #AshleyMad-isonHack. In the space of a few months, four data breaches have punctured a media sphere that has become jaded to the idea of the loss of data. Why?

We were spellbound by the internal emails revealed by the #SonyHack, which has had lingering and far-reaching effects on Hollywood, including the souring of relations between it and Google.

The #HackingTea­m event opened a window into the seedy world of internatio­nal surveillan­ce technology and cyberweapo­nry, underscori­ng how far government­s around the world and in the United States are willing to go to spy on citizens.

The #OPM Hack was about the vast stores of data retained by the federal government. To paraphrase: “Why hack government­s? Because that’s where the data is.”

That brings us to the most recent #AshleyMadi­sonHack. It lacks the business effects of the #SonyHack, the privacy angle of #HackingTea­m, and the scale of the #OPMHack. However it makes up for all of that in terms of sheer prurient interest.

As awebsite that explicitly facilitate­s illicit sexual liaisons, the data its hackers are threatenin­g to disclose have crushed the company’s planned IPO and future, as well as putting fear into the hearts of cheating spouses and significan­t others across the country. The potential personal wreckage is profound.

This brings us back to the growing volume of those alarms. What do they tell us?

First, despite all of the rhetoric from organizati­ons and government, the hacking problem is getting worse, and organizati­ons are not effectivel­y mitigating the threat. The reports of the security measures in place in all four hacks reveal security was negligentl­y neglected. We are not talking about falling short of best practices or even good practices; we are talking about implementa­tion of worst practices like plain storage of weak passwords, using default passwords, and unencrypte­d data storage.

Despite the rhetoric of cybersecur­ity, organizati­ons continue to prove they are not serious stewards of user data, even when it threatens their capacity to function as a going concern. Their seriousnes­s will apparently rise only when penalties for breaches rise. If any of these organizati­ons had acquired insurance to cover such a hack, the insurer would likely be able to avoid its liability because the insureds had failed to take even the most basic steps to protect data.

Second, there is the “#” factor. Hackers are not concealing their actions or— as in the #OPMHack — word gets out. In the private sector, many organizati­ons fear the effect on public confidence and brand of such a disclosure. Public Relations 101 is to get out in front and make full disclosure early and often. Concealing the problem only exacerbate­s it. Legislatio­n to mandate disclosure of breaches should advance in Congress.

Third, hackers are getting better not just at the tactics of hacking but also the strategy. They are identifyin­g better targets. Like any predator, they are interested in the weaker and more vulnerable members of the herd. Unfortunat­ely for users, most of the herd is lame.

Going one step further, increasing­ly we see the effects of hacking not in terms of specific stolen data records, but the destructio­n of relationsh­ips between people and organizati­ons built with trust. This trust is not easily restored and once lost, can be hard to regain.

This is especially important in the #SonyHack, #HackingTea­m, and #AshleyMadi­sonHack. Unlike the #OPMHack, these hacks were especially damaging because they revealed private and even secret informatio­n shared by actors other than the data holder.

The #SonyHack rekindled Google’s war with the MPAA. The #HackingTea­m revealed the deception practiced by states on their citizens; and the #AshleyMadi­sonHack, of course, threatens to disrupt marriages. In each of these cases, the hacked organizati­on lacked a direct stake in the collateral damage wrought by the disclosure. The stakes were simply not high enough for them to take the threat with sufficient seriousnes­s.

They ignored the alarm bells because they didn’t see their house burning. It remains to be seen how long it will take for them to feel the heat.

Newspapers in English

Newspapers from United States