Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Breach Fatigue Sets In With Consumers
Newest First  |  Oldest First  |  Threaded View
RichardB055
50%
50%
RichardB055,
User Rank: Apprentice
11/5/2014 | 1:37:56 PM
It's Really Breach Resignation
I believe that Ponemon and RSA have ignored their own observations and mischaracterized the attitude of consumers. The article states that "consumers really do little to alter their shopping behavior following breaches at their favorite stores" but also that "consumers still have strong opinions about how companies should protect their information and how they should respond to breaches."

This is not "breach fatigue" but rather "breach resignation." What can a consumer do realistically in order to counter the risk of a breach? They could no longer shop at a store that has suffered a breach, which many consumers including myself have done. Of course, this assumes that the stores publicly admit to having been breached and also assumes that consumers have an alternative place to shop. Consumers can also stop using credit cards and carry around large wads of cash with which to make their purchases. I've done that, too; but that poses a different type of security risk. Or, I suppose, consumers can bring a security team with them to conduct a security audit of the store and all of its suppliers whenever they want to buy a roll of toilet paper.

In fact, if a consumer really needs something and needs to use a credit card, they are at the mercy of the store with regard to protection from a breach. With an ever increasing number of stores suffering breaches, consumers have no practical alternative but to resign themselves that they are taking a risk by shopping there.
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
11/5/2014 | 11:34:57 AM
Difficult to visualise
I think a lot of the problems with this stem from the fact that the consumers can't see the problem and can't see the reaction from the company. Because it's all digital, it's hard to imagine it being real. 

If a store gets robbed at gunpoint, you might see an armed guard show up, or a better alarm system and security doors in place, but with a hack or data breach, it seems like business as usual for the consumers. So everything must be ok, right?
aws0513
100%
0%
aws0513,
User Rank: Ninja
11/4/2014 | 2:52:32 PM
Decisions are often local
The hard fact about the survey is that it cannot eliminate the human need for services or products when taking distance into consideration.

Example: If a person has reasonable access to only one hardware store, that person is going to use that hardware store.  The person may decide to stop using their payment card if a bank or ATM is conveniently located where they can get cash before going to the hardward store.  But if that is not the case, or they are in a pinch to get a certain product, they may conduct their own on-th-spot "risk assessment" and accept the risks involved with conducting an electronic purchase with the store.
I know some people would claim that there are always other stores or means to purchase services or products.  But that is not a realistic claim. 
Many parts of the world have a limited number of vendors that are nearby where they live and/or work.  If one needs to buy lumber, you could try to buy it online, but delivery options may be limited if there are no distribution points nearby.  BTW...  if you buy lumber, would you really trust the delivery guys to bring the quality lumber you expect?

I guess what I am trying to say is that reliance on customer actions to change commercial security practices is very likely a false expectation.

 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-4034
PUBLISHED: 2022-01-28
A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count c...
CVE-2021-40416
PUBLISHED: 2022-01-28
An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. All the Get APIs that are not included in cgi_check_ability are already executable by any logged-in users. An attacker can send an HTTP request to trigge...
CVE-2021-40419
PUBLISHED: 2022-01-28
A firmware update vulnerability exists in the 'factory' binary of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted series of network requests can lead to arbitrary firmware update. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2021-40423
PUBLISHED: 2022-01-28
A denial of service vulnerability exists in the cgiserver.cgi API command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted series of HTTP requests can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.
CVE-2021-44463
PUBLISHED: 2022-01-28
Missing DLLs, if replaced by an insider, could allow an attacker to achieve local privilege escalation on the DeltaV Distributed Control System Controllers and Workstations (All versions) when some DeltaV services are started.