No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Data Security and the “Low-Hanging Fruit”

by Christian Auty
December 1, 2015
in Cybersecurity

Protecting an organization from a data breach can seem daunting, and impossibly technical.  But the good news is that there are some basic precautions that can help.

There is a saying in the data security community that is a bit tired, but nevertheless true: There are two kinds of companies – those that have been hacked and those that will be hacked.  When clients come to us with questions about data security, it is often necessary to consult technological experts in this arena, especially when the client suspects that its data may have been breached.  All too often, the client first consults us only after this suspicion has arisen.  In these cases, we frequently find that basic and non-technical security best practices have been ignored.  In fact, an organization can make some fairly rudimentary changes to secure its data more fully, even without information security expertise.

These suggestions will by no means insulate a company from a data breach, but they may serve to diminish the probability of one.

Develop and Enforce Password Protocols

According to a fascinating recent series in Fortune Magazine concerning the Sony hack, Sony personnel were well-known to have a weak approach to passwords.  This was not due to a lack of knowledge about correct password protocols.  Rather, the problem was both cultural and political, and not unique to Sony.  The lesson the Sony hack offers is that data security broadly, and password policies in particular, require management buy-in and emphasis.  Without such engagement, an organization’s password policy will not be followed and simple passwords will be chosen, with predictable consequences.

A good password policy should do two things: 1) enforce strong password protocols (i.e., numbers, symbols, capital letters and consider no dictionary words) and 2) force a password change every three to six months.  Password strength requires no explanation.  I once saw a beer cozy at a football tailgate that said “I drink because your password is password.”  A strong password is basic stuff and important.  The second requirement is also very important but for a different reason.  Clients often ask, “If my password is so strong, why do I need to change it?”  The answer is that you probably don’t need to change it if you never disclose it and never use it anywhere else ever.  Of course, this scenario doesn’t exist.  In practice, we use the same passwords for multiple log-ons.  By changing passwords frequently, we are attempting to achieve enterprise differentiation.  This essentially reinforces a basic tenet of a good employer’s security policy—namely, that employees must have strong and completely unique passwords used only for work.  To be sure that enterprise differentiation is achieved, one final requirement is needed: no repeats.  Otherwise, employees may simply rotate the same two passwords over and over again.

With a little work, standard operating systems can be made to enforce these standards.  Typically, no new software is required, but the policy must be compulsory.  Simply asking employees to change their passwords and sending email reminders likely is not enough to achieve 100 percent compliance.

Enterprise differentiation should be the goal of every business.  Employees are constantly bombarded with spam and spear-phishing attempts targeting an array of data in their daily lives.  If an employee’s bank password is the same as his work password, then the strength of the password is wiped out. In fact, a startling percentage of data breaches originate from legitimate credentials.  Remember, it is very easy for a hacker to figure out where a target works, as this information is almost always publicly available on LinkedIn and Facebook.  The steps outlined above will help ensure that a hacked employee does not result in a hacked employer.

Patch Your Security Vulnerabilities

Almost invariably, software that is released to the public, even very popular software that is widely used, will have security vulnerabilities.  Hackers will attempt to exploit these vulnerabilities.  The stakes can be huge: everyone has the software, and nobody knows about the vulnerability.

Researchers at top technology firms devote a substantial portion of their time to finding these vulnerabilities, or the malware that exploits them, before too much damage is done.  An attack based on a latent vulnerability is called, rather ominously, a “zero-day” attack, because the vulnerability existed at inception and, once known, the developer has zero days to fix it.  For example, as detailed in this account, a group called Pawn Storm recently utilized a latent vulnerability in Adobe Flash to spear-phish various government agencies.  And as new software is released, new exploits will be revealed, attacked and patched.

Sadly, there is little average users can do at the outset to protect themselves from a “zero-day” attack.  The good news is that, very often, the author will respond with a software “patch,” freely provided to all users, to resolve the vulnerability.  This works as long as users actually apply the patch to their system.  Yet, according to HP Security Research’s 2015 Cyber Risk Report, well-known and even decades-old attacks remain effective, because users simply do not patch their software.

An effective patching strategy again starts with management focus.  Frequently, patching means downtime, as it is often difficult or impossible to use applications while the patch is being implemented on users’ machines.  This means scheduling appropriate times for patch implementation and working hand-in-hand with IT to determine when patches are complete.  Ask your IT professional today about their patching strategies and difficulties.

Security Begins with Information Governance

It sounds absurdly simple, but you cannot lose what you do not have.  The storage of unnecessary information, whether it is legacy emails or structured data that is no longer of value remains an enormous obstacle for many companies.  Frequently, overly cautious approaches to data retention result in real costs; indeed, not only does the retained data expand an organization’s threat surface, it also imposes real and potential costs in terms of storage and discovery in litigation.  Federal Rule of Civil Procedure 37 permits an organization to develop and enforce a routine email deletion policy, assuming the information is not subject to actual or threatened litigation.  This rule, which is almost certain to be amended in December 2015 to even more favorable language, acts as a safe harbor for organizations deleting email information in good faith.  Engage your counsel in a discussion concerning your information governance policies and practices.  Every organization is different and every organization has different data needs, but it is very likely that most companies are storing too much extraneous data, vulnerable to hackers and plaintiffs alike.


Tags: Communications ManagementData Governance
Previous Post

5 Cloud Compliance Misfires (and How to Avoid Them)

Next Post

Take a Lesson from Theranos: Plan Ahead

Christian Auty

Christian Auty

Christian Auty is a Principal at law firm Much Shelist. An experienced litigator, Christian has an established reputation as a strong client advocate and is well-versed in issues on the intersection of law and technology, including data privacy and data breach response, electronic discovery, data storage and retention practices and information governance. .

Related Posts

news roundup data grungy

Almost Half of Compliance Leaders Cite Time Crunch as Barrier to Tech Adoption

by Staff and Wire Reports
November 19, 2025

AI adoption surges in audit; 37% of life sciences, consumer product companies missed a regulatory requirement in past year

consumer data disclosure on smartphone

What You Need to Know About Maryland’s New Data Privacy Law

by Karan Manohar and Gia Grimm
November 18, 2025

The law shifts focus from allowing unlimited data for company purposes to providing collection as a service benefiting consumers

uncertain path forward misty road

What Does Effective AI Governance Look Like in Uncertain Times?

by Tara Cho
November 11, 2025

Existing data governance programs can often provide solid foundation

data governance sorting concept

What Compliance Leaders Need to Know Ahead of Crucial DOJ Data Security Program Deadline

by Townsend Bourne
September 8, 2025

Civil, criminal penalties await companies not ready to comply with new initiative

Next Post
elizabeth holmes of theranos

Take a Lesson from Theranos: Plan Ahead

reminder to speak up
No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights