Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/10/2013
07:30 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

SSNs Exposed In Most Data Breaches In California

State Attorney General calls for adoption of encryption in 'leading edge' data breach report

More than half of Californians whose personal information was exposed in data breaches last year wouldn't be a statistic if the breached companies had used encryption.

That's one of the main takeaways of a voluntary, first-ever report, published last week by California Attorney General Kamala Harris, which found that 2.5 million residents of the state were affected by the 131 reported data breach incidents in 2012.

"If encryption had been used, over 1.4 million Californians would not have had their information put at risk in 2012," Harris said. "It is my strong recommendation that companies and agencies implement encryption as a basic protection and reasonable security measure to help them meet their obligation to safeguard personal information entrusted to them."

California in 2003 passed the first data breach notification law that mandated that businesses and state agencies notify citizens when their personal data was exposed in a security breach. The state later passed a law requiring organizations to report breaches to the Attorney General's Office that affect more than 500 residents.

Harris also recommends amending the existing breach notification legislation to include the breach of online credentials.

Security experts applauded the Attorney General's new, voluntary report. "I think the California data breach report is on the leading edge of better breach reporting that we need," says Chris Wysopal, CTO at Veracode. "It makes recommendations based on the breaches studied, which is welcome news."

The catch is that companies are not required by law to use encryption for personal data in transit. "We are all familiar with PCI requirements to encrypt credit card numbers, but that doesn't extend outside of that limited scope. On the other hand, HIPAA requires PHI to be kept private, which I would interpret as requiring encryption as PHI transits a public network, such as the Internet, or is moved physically where it can be lost or physically stolen," he says.

Even so, Wysopal says Harris' recommendation for encryption use is good news. In the report, Harris says her office will prioritize the investigation of breaches that involved unencrypted personal information, and urge other law enforcement agencies to do the same. She even makes a pitch to California lawmakers: "The Legislature may also want to consider requiring the use of encryption to protect personal information in transit," Harris said in the report.

Organizations don't encrypt personally identifiable information mainly for convenience reasons, Wysopal notes. "It is an extra step to encrypt and transfer the key securely to the recipient of the data. So we often see attachments sent through email and files on removable media or laptops unencrypted," he says. "Frankly, at this point it is practically negligent not to encrypt data that would require notification if lost or stolen."

He says California has the opportunity to spearhead the use of encryption. "California wants to be on the cutting edge of the technology industry and consumer data protection. Improving the way businesses handle data will give confidence to consumers and speed innovation, which helps their economy," he says.

The report also said that if encryption had been used in the breaches, 28 percent of the incidents would not have required notification. The average incident affected 22,500 citizens' information, while the median breach size affected 2,500 people, with five breaches affecting 100,000 or more people.

Retail was the most breached industry in California last year, accounting for 26 percent of all of the reported breaches. The financial and insurance industry was second, with 23 percent.

Social security numbers were exposed in 56 percent of the breaches, and more than half of all reported breaches in the state came from outside attackers or insider threats. Some 45 percent were due to error or not employing the proper security measures.

Veracode's Wysopal says a national cybersafety board, akin to the National Transportation Safety Board, is needed. "A National Cyber Safety Board could take the detail provided in the CA breach report to a whole new level," he says.

That could help drill down into the core issues behind the breach, he says. "What security controls were in place that failed? What was the failure? A 0day vulnerability, an unpatched computer, a misconfigured computer, a human error? Were there processes that failed? What was the training of the operators? Did detection technology detect the breach or did it fail?"

The full California Data Breach Report 2012 is available here for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10101
PUBLISHED: 2019-07-23
ServiceStack ServiceStack Framework 4.5.14 is affected by: Cross Site Scripting (XSS). The impact is: JavaScrpit is reflected in the server response, hence executed by the browser. The component is: the query used in the GET request is prone. The attack vector is: Since there is no server-side valid...
CVE-2019-10102
PUBLISHED: 2019-07-23
Voice Builder Prior to commit c145d4604df67e6fc625992412eef0bf9a85e26b and f6660e6d8f0d1d931359d591dbdec580fef36d36 is affected by: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). The impact is: Remote code execution with the same privileges as the...
CVE-2019-10102
PUBLISHED: 2019-07-23
Jeesite 1.2.7 is affected by: SQL Injection. The impact is: sensitive information disclosure. The component is: updateProcInsIdByBusinessId() function in src/main/java/com.thinkgem.jeesite/modules/act/ActDao.java has SQL Injection vulnerability. The attack vector is: network connectivity,authenticat...
CVE-2018-18670
PUBLISHED: 2019-07-23
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Extra Contents" parameter, aka the adm/config_form_update.php cf_1~10 parameter.
CVE-2018-18672
PUBLISHED: 2019-07-23
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board head contents" parameter, aka the adm/board_form_update.php bo_content_head parameter.