No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights

Data Security and the “Low-Hanging Fruit”

by Christian Auty
December 1, 2015
in Uncategorized
Data Security and the “Low-Hanging Fruit”

Protecting an organization from a data breach can seem daunting, and impossibly technical.  But the good news is that there are some basic precautions that can help.

There is a saying in the data security community that is a bit tired, but nevertheless true: There are two kinds of companies – those that have been hacked and those that will be hacked.  When clients come to us with questions about data security, it is often necessary to consult technological experts in this arena, especially when the client suspects that its data may have been breached.  All too often, the client first consults us only after this suspicion has arisen.  In these cases, we frequently find that basic and non-technical security best practices have been ignored.  In fact, an organization can make some fairly rudimentary changes to secure its data more fully, even without information security expertise.

These suggestions will by no means insulate a company from a data breach, but they may serve to diminish the probability of one.

Develop and Enforce Password Protocols

According to a fascinating recent series in Fortune Magazine concerning the Sony hack, Sony personnel were well-known to have a weak approach to passwords.  This was not due to a lack of knowledge about correct password protocols.  Rather, the problem was both cultural and political, and not unique to Sony.  The lesson the Sony hack offers is that data security broadly, and password policies in particular, require management buy-in and emphasis.  Without such engagement, an organization’s password policy will not be followed and simple passwords will be chosen, with predictable consequences.

A good password policy should do two things: 1) enforce strong password protocols (i.e., numbers, symbols, capital letters and consider no dictionary words) and 2) force a password change every three to six months.  Password strength requires no explanation.  I once saw a beer cozy at a football tailgate that said “I drink because your password is password.”  A strong password is basic stuff and important.  The second requirement is also very important but for a different reason.  Clients often ask, “If my password is so strong, why do I need to change it?”  The answer is that you probably don’t need to change it if you never disclose it and never use it anywhere else ever.  Of course, this scenario doesn’t exist.  In practice, we use the same passwords for multiple log-ons.  By changing passwords frequently, we are attempting to achieve enterprise differentiation.  This essentially reinforces a basic tenet of a good employer’s security policy—namely, that employees must have strong and completely unique passwords used only for work.  To be sure that enterprise differentiation is achieved, one final requirement is needed: no repeats.  Otherwise, employees may simply rotate the same two passwords over and over again.

With a little work, standard operating systems can be made to enforce these standards.  Typically, no new software is required, but the policy must be compulsory.  Simply asking employees to change their passwords and sending email reminders likely is not enough to achieve 100 percent compliance.

Enterprise differentiation should be the goal of every business.  Employees are constantly bombarded with spam and spear-phishing attempts targeting an array of data in their daily lives.  If an employee’s bank password is the same as his work password, then the strength of the password is wiped out. In fact, a startling percentage of data breaches originate from legitimate credentials.  Remember, it is very easy for a hacker to figure out where a target works, as this information is almost always publicly available on LinkedIn and Facebook.  The steps outlined above will help ensure that a hacked employee does not result in a hacked employer.

Patch Your Security Vulnerabilities

Almost invariably, software that is released to the public, even very popular software that is widely used, will have security vulnerabilities.  Hackers will attempt to exploit these vulnerabilities.  The stakes can be huge: everyone has the software, and nobody knows about the vulnerability.

Researchers at top technology firms devote a substantial portion of their time to finding these vulnerabilities, or the malware that exploits them, before too much damage is done.  An attack based on a latent vulnerability is called, rather ominously, a “zero-day” attack, because the vulnerability existed at inception and, once known, the developer has zero days to fix it.  For example, as detailed in this account, a group called Pawn Storm recently utilized a latent vulnerability in Adobe Flash to spear-phish various government agencies.  And as new software is released, new exploits will be revealed, attacked and patched.

Sadly, there is little average users can do at the outset to protect themselves from a “zero-day” attack.  The good news is that, very often, the author will respond with a software “patch,” freely provided to all users, to resolve the vulnerability.  This works as long as users actually apply the patch to their system.  Yet, according to HP Security Research’s 2015 Cyber Risk Report, well-known and even decades-old attacks remain effective, because users simply do not patch their software.

An effective patching strategy again starts with management focus.  Frequently, patching means downtime, as it is often difficult or impossible to use applications while the patch is being implemented on users’ machines.  This means scheduling appropriate times for patch implementation and working hand-in-hand with IT to determine when patches are complete.  Ask your IT professional today about their patching strategies and difficulties.

Security Begins with Information Governance

It sounds absurdly simple, but you cannot lose what you do not have.  The storage of unnecessary information, whether it is legacy emails or structured data that is no longer of value remains an enormous obstacle for many companies.  Frequently, overly cautious approaches to data retention result in real costs; indeed, not only does the retained data expand an organization’s threat surface, it also imposes real and potential costs in terms of storage and discovery in litigation.  Federal Rule of Civil Procedure 37 permits an organization to develop and enforce a routine email deletion policy, assuming the information is not subject to actual or threatened litigation.  This rule, which is almost certain to be amended in December 2015 to even more favorable language, acts as a safe harbor for organizations deleting email information in good faith.  Engage your counsel in a discussion concerning your information governance policies and practices.  Every organization is different and every organization has different data needs, but it is very likely that most companies are storing too much extraneous data, vulnerable to hackers and plaintiffs alike.


Tags: Communications Management
Previous Post

The Trans-Pacific Partnership Agreement: A Breakthrough in Global Anti-Corruption Efforts

Next Post

Top 10 Technology Challenges for IT Audit Professionals – New Study from ISACA and Protiviti

Christian Auty

Christian Auty

Christian Auty is a Principal at law firm Much Shelist. An experienced litigator, Christian has an established reputation as a strong client advocate and is well-versed in issues on the intersection of law and technology, including data privacy and data breach response, electronic discovery, data storage and retention practices and information governance. .

Related Posts

cubist style art of robot holding a pencil

Want to Be Part of the Generative AI Revolution? Start With Treating It Like an Assistant.

by Dave Cumberland
October 31, 2023

Integrating AI into internal communications can streamline how teams talk to each other

stack of newspapers on laptop

The Social Construction of a Scandal

by Michael Toebe
December 9, 2019

Do corporate execs and legal counsel truly understand the role news media plays in establishing the narrative about fault and...

woman holding smartphone with many "like" and "heart" reactions

Engaging Social Media is More Effective Risk Management

by Michael Toebe
October 25, 2019

Social media communication is a rarely implemented risk management tool, but it should get more play. Michael Toebe makes the...

black and white illustration of shark jumping out of water

The Shark in the Wave: Revealing the Lurking Danger of Slack Data

by James Murphy
June 17, 2019

Hanzo’s Jim Murphy explores the danger of Slack data; voluminous, informal, unstructured and context-dependent, it’s a threat hiding in plain...

Next Post
Top 10 Technology Challenges for IT Audit Professionals – New Study from ISACA and Protiviti

Top 10 Technology Challenges for IT Audit Professionals – New Study from ISACA and Protiviti

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights