9 Lessons From Utah Data BreachBreach of unencrypted data affected 28% of the state's residents; one in 10 had Social Security numbers stolen. How can you avoid such an epic fail?
Anonymous: 10 Facts About The Hacktivist Group (click image for larger view and for slideshow)
How bad was the March 30 data breach involving Utah residents?
By current counts, 500,000 (18%) of the state's 2.8 million residents, including children, had their health data compromised. In addition, another 280,000 residents (10%) had their Social Security numbers breached.
The incident is smaller in size than last year's data exposure of 3.5 million records in Texas, which were managed by the Texas comptroller's office. But the two incidents suggest that many government agencies--not to mention businesses--are still learning data breach prevention basics only after sensitive information gets exposed.
How can other organizations prevent a breach of Utah-like proportions? Start here:
1) Get serious about breaches before you're breached.
"The good news, if there is any, is that Utah is now Very Serious about Identity Theft, launching its new IRIS: Identity Theft Reporting Information System in response," said Gary Warner, the director of research in computer forensics at the University of Alabama at Birmingham, in a blog post. "What will it take for the other states to get serious about identity theft?"
2) Create a post-breach response plan. For the best results, treat breaches as an eventuality, and ensure that a breach response plan is in place in advance. Did Utah have such a plan in place? The relative slowness of the breach response suggests otherwise. Notably, Utah governor Gary R. Herbert last week announced that he'd created and filled a new position--data security ombudsman--to help anyone affected by the data breach. "They will focus on providing individual case managemet (sic), credit and indentity (sic) theft counseling, and community outreach," according to a data breach information center that's been created by the state's health and technology departments.
3) Keep residents out of the crosshairs. In a speech delivered last week, Gov. Herbert likened the state's citizens to soldiers who were being directly attacked by identity thieves. "The state of Utah must restore the trust placed in it," he said. "Cyber-security is the modern battlefront and we are all enlisted--you, me, our state agencies, the legislature--all of us have a critical role to play." Then again, if the state had put a better data breach prevention plan in place, the governor wouldn't have to reach for military metaphors; the information would simply be safe. On the plus side, however, the state has now brought in a third-party auditor to assess all of its systems.
4) Ex-CIO reports attack volume difficult to manage. Did the state budget enough to maintain proper levels of information security? Last week, the governor announced that Stephen Fletcher, executive director of the Department of Technology Services, had resigned. Fletcher also told Deseret News that he took full responsible for the breach, since it "took place under my watch."
But trying to maintain a perfect, breach-free record is getting increasingly difficult. "There has been a huge increase in the number of attacks against state systems--about a 600% increase in the last four months--and it is always a difficult challenge to make sure that you have adequate resources there to make sure the attacks are turned away," Fletcher said.
5) Beware rogue servers, motivated thieves. When it came to the breach, Fletcher told Deseret News that "99% of the state's data is behind two firewalls, this information was not" and furthermore that the data "was not encrypted and it did not have hardened passwords." He said that criminals--believed to be from Eastern Europe-- were able to steal the information via a single health department server, which appeared to have been rolled out without following the state's own information security protocols. The state has said it's continuing to investigate employees who might have been involved, and at least one state lawmaker has questioned what he sees as a high level of turnover in the technology department.
6) Breaches might involve more than "customers." Is your business storing too much data? Utah has warned residents that "a substantial amount of people who have no history with either the Medicaid or CHIP [Children's Health Insurance Program] programs had their personal information stolen off the server. This is because healthcare providers often submit personal information on patients to the state in order to check their status as possible Medicaid recipients." Although this was standard practice--oftentimes even for people with private insurance--it begs the question of why this information wasn't deleted after people's Medicaid status was relayed to insurers.
7) Breached Social Security numbers permanently insecure. The Utah Department of Health said it's sent letters to all residents whose Social Security numbers were breached, and is offering them one year of free credit monitoring services. But that's arguably a band-aid solution, because once Social Security numbers get stolen, and remain available for identity thieves to exploit, such numbers can't be recovered. Identity theft victims can get a new Social Security number, but doing so will reset their credit history, which could make life difficult in other ways.
8) Consider how much credit monitoring will be necessary. Security experts also have questioned the duration of the state's credit monitoring offer. "One year is not really much protection considering your Social Security number is with you for life, and most of us don't change addresses all that often," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.
Furthermore, he noted that the head of Utah's health department had suggested that the stolen information "goes stale" after a year. "It is this kind of attitude that might contribute to bureaucrats making half-baked attempts at protecting the data to begin with, not considering that these incidents may haunt victims their whole lives," he said.
9) Time for national ID cards? Given the difficulty of replacing Social Security numbers, is it time to revisit the notion of providing people with a national identity card? According to Warner at the University of Alabama at Birmingham, Spain's national identity card contains a digitized photo, signature, and fingerprints for the owner, and is used to secure Social Security numbers. "If you have my number, but not the chip in my card, it is worthless to you," he said. If businesses and government agencies are going to rely on Social Security numbers to identify people, maybe it's time for the United States to find a similar way to help keep the information secure.
At a time when cybercrime has never been more prolific and sophisticated, budgets are being cut. In response, IT is taking a hard look using third-party services--outsourcing--to meet security challenges. Our Making The Security Outsourcing Decision report outlines the various security outsourcing options available. (Free registration required.)