Data Security

Data Security

The current emphasis in the cybersecurity world is on countering hacking operations. So naturally, organizations invest heavily in preventing outsiders (sorry for the old terminology :-) Zero Trust will come soon) from entering their networks and do whatever they can to prevent these hackers from accessing data once inside the perimeter. But the shifting technological and business landscape makes this perception obsolete.

The new IT architecture that involves on-premise assets, Cloud and hybrid ones (as well as mobile and websites) make it extremely hard to defend against threats. Moreover, the actual perpetrators have changed. The new structure allows even non-professional hackers to gain access to data that was previously only possible through extremely difficult “hacking”. Examples are widespread. A marketing services firm left an unprotected MongoDB database that led to the exposure of 982 Million email accounts  (that’s nearly one billion individuals). An Unsecured Gearbest server exposes millions of shoppers and their orders. Dozens of companies leaked sensitive data thanks to misconfigured Box accounts. I recently attended a lecture by Noam Rotem (white hat hacker for fun) that emphasized how easy it is to compromised organizations. His examples were shocking 

Noam Rotem
Noam Rotem waves his hands in despair

And to prove that there’s more than money at stake- a recent data breach exposes data of 34,000 medical marijuana patients- including Diagnostic results, healthcare numbers, and personal contact information, all of which are sensitive 

But it’s not always about “hacking” (or any activity aimed at obtaining data). The move to the cloud allows even employees (or ex-employees) to access data, and if they wish to, to manipulate it.

Our Data is safe in there
Our Data is safe in there, we think

Just recently a British man was sent to prison for two years after he wiped out his last employer’s business-critical data in cloud storage, according to a report by the United Kingdom’s Thames Valley Police. An IT consultant at a digital marketing and software agency was sacked for poor performance, so he used a former coworker’s Amazon Web Services (AWS) account to access 23 AWS servers, where he deleted data related to the firm’s clients. The act cost the company £500,000 in lost contracts, and the data was never reconstituted. Given that (according to a recent survey) 30% of IT professionals still consider cybersecurity as the responsibility of their cloud service provider, it is easy to see why such incidents are plentiful.

To solve these esechallenges we must use both technological means (better security mechanisms) and improved regulation. A simple example of regulation at work (other than GDPR J) would be the one mandated by The Australian Taxation Office. It has implemented security standards relating to business owners offering cloud-based payroll services.

The final component is, of course, better awareness and proficiency by security professionals. It is up to them to identify the potential pitfalls of this new enterprise architecture and make sure they secure it using technologies and procedures (no security product will help if your DevOps team saves passwords in clear text on GitHub, or misconfigures an AWS server).

This leads directly to the subject of Zero Trust architecture. A super interesting topic that is everywhere now. Well, Leia (my one and only princess) woke up… time to initiate in-house security, so, more on this next time. 

Keep safe! Dotan

要查看或添加评论,请登录

Dotan Bar Noy的更多文章

  • For those of us who spend way too much time on Twitter

    For those of us who spend way too much time on Twitter

    For those of us who spend way too much time on Twitter, you may have noticed something strange pop up on your timeline…

    7 条评论
  • My take of the Verizon DBIR 2019 report

    My take of the Verizon DBIR 2019 report

    The Verizon Data Breach Investigations Report is the cybersecurity industry’s equivalent of Leo Tolstoy’s Novel “War…

    5 条评论
  • Cyber in Aviation and Automotive

    Cyber in Aviation and Automotive

    Growing up in the 80s, we used to think that by the year 2000 we’d be all moving around in flying cars. A Flying…

    2 条评论
  • From Zero to One (keep calm and trust no one)

    From Zero to One (keep calm and trust no one)

    Following up from my previous post, it is clear that the traditional approaches for securing the enterprise networks…

    5 条评论
  • IoT Security- it's complicated ...

    IoT Security- it's complicated ...

    IoT security is an extremely hot topic right now. I recently was asked by a friend (a VC partner) to talk with a very…

    8 条评论
  • “Say AI again, I dare you, I double dare you!”

    “Say AI again, I dare you, I double dare you!”

    Four in ten of Europe’s artificial intelligence start-ups demonstrate little evidence of actually using artificial…

    8 条评论
  • They offered me something I couldn’t refuse (and what I have learned in the process)

    They offered me something I couldn’t refuse (and what I have learned in the process)

    Not so long ago I told you about my latest startup – @forcenock (a Web Application Security Solution). We were doing…

    8 条评论
  • Hacking our Democratic voting process

    Hacking our Democratic voting process

    Wake up everybody, it’s 2019 and everything we’ve even known about democratic elections is wrong. Growing up in the…

    5 条评论
  • Stopping to Appreciate the View

    Stopping to Appreciate the View

    Something personal, general thoughts, and ForceNock updates. I have continued the “work hard, play hard” lifestyle for…

    8 条评论
  • A New beginning & a new venture

    A New beginning & a new venture

    Sorry in advance for the long post, but it has been a while. This time - something personal, general thoughts & the new…

    15 条评论

社区洞察

其他会员也浏览了