Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Breach Fatigue Sets In With Consumers
Oldest First  |  Newest First  |  Threaded View
aws0513
100%
0%
aws0513,
User Rank: Ninja
11/4/2014 | 2:52:32 PM
Decisions are often local
The hard fact about the survey is that it cannot eliminate the human need for services or products when taking distance into consideration.

Example: If a person has reasonable access to only one hardware store, that person is going to use that hardware store.  The person may decide to stop using their payment card if a bank or ATM is conveniently located where they can get cash before going to the hardward store.  But if that is not the case, or they are in a pinch to get a certain product, they may conduct their own on-th-spot "risk assessment" and accept the risks involved with conducting an electronic purchase with the store.
I know some people would claim that there are always other stores or means to purchase services or products.  But that is not a realistic claim. 
Many parts of the world have a limited number of vendors that are nearby where they live and/or work.  If one needs to buy lumber, you could try to buy it online, but delivery options may be limited if there are no distribution points nearby.  BTW...  if you buy lumber, would you really trust the delivery guys to bring the quality lumber you expect?

I guess what I am trying to say is that reliance on customer actions to change commercial security practices is very likely a false expectation.

 
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
11/5/2014 | 11:34:57 AM
Difficult to visualise
I think a lot of the problems with this stem from the fact that the consumers can't see the problem and can't see the reaction from the company. Because it's all digital, it's hard to imagine it being real. 

If a store gets robbed at gunpoint, you might see an armed guard show up, or a better alarm system and security doors in place, but with a hack or data breach, it seems like business as usual for the consumers. So everything must be ok, right?
RichardB055
50%
50%
RichardB055,
User Rank: Apprentice
11/5/2014 | 1:37:56 PM
It's Really Breach Resignation
I believe that Ponemon and RSA have ignored their own observations and mischaracterized the attitude of consumers. The article states that "consumers really do little to alter their shopping behavior following breaches at their favorite stores" but also that "consumers still have strong opinions about how companies should protect their information and how they should respond to breaches."

This is not "breach fatigue" but rather "breach resignation." What can a consumer do realistically in order to counter the risk of a breach? They could no longer shop at a store that has suffered a breach, which many consumers including myself have done. Of course, this assumes that the stores publicly admit to having been breached and also assumes that consumers have an alternative place to shop. Consumers can also stop using credit cards and carry around large wads of cash with which to make their purchases. I've done that, too; but that poses a different type of security risk. Or, I suppose, consumers can bring a security team with them to conduct a security audit of the store and all of its suppliers whenever they want to buy a roll of toilet paper.

In fact, if a consumer really needs something and needs to use a credit card, they are at the mercy of the store with regard to protection from a breach. With an ever increasing number of stores suffering breaches, consumers have no practical alternative but to resign themselves that they are taking a risk by shopping there.


Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27605
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 uses Ghostscript for processing of uploaded EPS documents, and consequently may be subject to attacks related to a "schwache Sandbox."
CVE-2020-27606
PUBLISHED: 2020-10-21
BigBlueButton before 2.2.8 (or earlier) does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
CVE-2020-27607
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), the client-side Mute button only signifies that the server should stop accepting audio data from the client. It does not directly configure the client to stop sending audio data to the server, and thus a modified server could store the audio data and/or tr...
CVE-2020-27608
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), uploaded presentations are sent to clients without a Content-Type header, which allows XSS, as demonstrated by a .png file extension for an HTML document.
CVE-2020-27609
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 records a video meeting despite the deactivation of video recording in the user interface. This may result in data storage beyond what is authorized for a specific meeting topic or participant.