Wednesday, July 27, 2016

Operationalized Breaches

The attackers have become more business-oriented in that the focus has moved from street credibility to financial gain. This is very evident when there is a breach involved and the attackers sell patient data, encrypts the enterprise with ransomware, or otherwise extort money from the victim. One area hit especially significantly has been the medical field. With the medical patient information and personal identifiable information, this was a likely target.

To avoid issues in your enterprise, medical or otherwise, there are several action to take. One action to take would be to review the network for where confidential data is located. This is not only employee information, but also proprietary data on business assets and patients, along with their credit card numbers. These areas should be examined periodically along with the logs. These areas should be accessed only by the appropriate parties, applying the principle of least privilege. 

With any business, there would be vendor contracts. When the renewal periods would come along, if not already included, the contracts should include the vendor shall comply with your data security and incident response policy, or provide you with their policy for your review and acceptance. Your enterprise is only as strong and robust as the weakest link. If this is an external partner and you have no idea of their security or their stance on reporting breaches, there may be an issue for you in the future.

             


Miel, LLC Infosec Managed Services & Consulting


810-701-5511

charlesparkerii@gmail.com

It is not about winning or losing, but reorienting yourself to the real problem-managing the risk across the enterprise.

No comments:

Post a Comment