Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/15/2007
03:17 PM
50%
50%

Data Safety -- The Old Fashioned Way

We can all breathe easier. WellPoint, the country's largest managed care firm, has found its missing disk -- the unencrypted one that contains the personal information (including Social Security numbers and medical records) of 75,000 people. It had been lost in transit by UPS. But they found it. Don't you feel better?

We can all breathe easier. WellPoint, the country's largest managed care firm, has found its missing disk -- the unencrypted one that contains the personal information (including Social Security numbers and medical records) of 75,000 people. It had been lost in transit by UPS. But they found it. Don't you feel better?The idea that these companies still think it's OK to stick a CD with highly confidential information into an envelope and drop it off at their nearest UPS office (or hand it to the UPS guy), even after all the other examples of lost and stolen data that we've had over the past couple of years, has got to make you wonder: What were they thinking? I've got nothing against UPS, but how many packages get lost/torn/misrouted every year by package services?

And the icing on this particular cake is that the disk wasn't even encrypted. Thousands of Social Security numbers, and not even the most basic security protocols were followed. Heck, I have better security on my trusty USB flash drive (which contains my secondary e-mail app and a few personal documents). If I know the value of encryption, shouldn't the experts entrusted with our medical data have some kind of clue?

Actually, I should be fair to WellPoint's personnel. They didn't actually send the disk out via UPS. It was a third-party vendor, Health Data Management Solutions (which, according to its Web site, "prides itself on setting the standard for data management and analytic services"), that sent the disk out via UPS. It makes you wonder just what today's standard for data management is these days.

WellPoint has stated that Magellan Behavioral Health Services, the intended recipient of the disk, will now only transmit data through a secure network. That's certainly nice to know. These companies sound so up-to-date technologically that one can't help wondering if they will have to upgrade their systems first -- to Windows XP.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The security team seem to be taking SiegeWare seriously" 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16770
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
CVE-2019-19609
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
CVE-2019-16768
PUBLISHED: 2019-12-05
Exception messages from internal exceptions (like database exception) are wrapped by \Symfony\Component\Security\Core\Exception\AuthenticationServiceException and propagated through the system to UI. Therefore, some internal system information may leak and be visible to the customer. A validation m...
CVE-2012-1105
PUBLISHED: 2019-12-05
An Information Disclosure vulnerability exists in the Jasig Project php-pear-CAS 1.2.2 package in the /tmp directory. The Central Authentication Service client library archives the debug logging file in an insecure manner.
CVE-2019-16769
PUBLISHED: 2019-12-05
Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash...