A year after the actual laptop filled with 620,000 person’s personally identifiable information (PII) and personal health information (PHI) was stolen from Medicentres Family Care Clinics, Danielle Smith of the Wildrose Party in Alberta Canada asks: “Why did all of this information exist in a single file on a computer in the first place?” I’m sure it was the same old reasons. Most of the time it’s about a worker who is high on work ethic, but low on security awareness trying to do what they see as a good thing. So they take data out of what was likely a well-protected structured application and use the weapon of mass destruction built into every PC and personal device (it’s called copy and paste) and they create a spreadsheet or document. They don’t mean to create a huge risk. Of course, if you’re regularly scanning all the machines and file shares where people who have access to sensitive data can possibly store this type of data, you could find it. However, that would require having the ability to scan, the knowledge of where sensitive data lies, and the knowledge about who has access to what. This level of access control is a puzzle most people haven’t even taken out of the box yet. They haven’t even realized they are missing pieces.
Better security awareness could go a long way here. If every person who is supposed to have access to sensitive data were required to go through a 30 minute 1 on 1 meeting with a security professional to let them know the ways they could get in trouble, many of these headlines would disappear. Not all would, though. So along with awareness you will require a program to both prevent these situations from occurring, as well as detective controls to see when things slip through the cracks. After all, perfect prevention requires flawless prediction. Flawless is a standard no one can expect to meet. Everyone knows the old expression: “trust but verify”. You do want to train your staff and trust they will understand and deploy the training well. You also want to put detective controls in place to ensure that when they make mistakes the first thing that catches them is your system and not a bad guy.
StealthAUDIT – Data Collection, Analysis, Remediation, and Reporting for Microsoft Infrastructure, Applications, and Beyond
StealthINTERCEPT – Real-time Monitoring and Control over Change and Access for Active Directory, Exchange, and File Systems
Jonathan Sander is STEALTHbits’ Chief Technology Officer (CTO). As CTO, he is responsible for driving technical innovation, ensuring that STEALTHbits is well positioned in their current and emerging markets, and he will also lead corporate development efforts. Jonathan also plays the role of evangelist at STEALTHbits venues large and small. Prior to STEALTHbits, Jonathan was VP of Product Strategy for Lieberman Software.
As part of Quest Software from 1999 through 2013, he worked with the security and ITSM portfolios. He helped launch Quest’s IAM solutions, directing all business development and product strategy efforts. Previous to that, Mr. Sander was a consultant at Platinum Technology focusing on the security, access control and SSO solutions. He graduated from Fordham University with a degree in Philosophy.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.
Read more© 2022 Stealthbits Technologies, Inc.
Leave a Reply