Inspector General Calls VA on Carpet Over Data Theft
Internal report cites 'indifference' of security officers
Computerworld - Information security officers and other officials at the U.S. Department of Veterans Affairs reacted with "indifference" and a "lack of urgency" after learning about the theft of computer hardware containing personal data on millions of veterans, according to a report released last week by the agency's inspector general.
The report also says that process and policy failures, a lack of supervision and personal squabbles contributed to the security breach and the VA's response to the incident. The inspector general recommended several steps for addressing the shortcomings, including the adoption of a "clear, concise" policy for safeguarding sensitive data.
In a letter to the inspector general that was included with the report, VA Secretary R. James Nicholson said he fully concurs with the recommendations and is committed to making the VA "a gold standard" for information security among government agencies.
The security breach "exposed deficiencies in information security involving leadership, policies and procedures," Nicholson wrote. "That will change during my tenure." He added that he has made it clear inside the VA that improving security and reorganizing the agency's Office of Information Technology "are my top priorities going forward."
'Decades of Neglect'
But Bruce Brody, a former chief information security officer at the VA, called the inspector general's findings a little underwhelming. The report "points fingers at all the symptoms instead of all the underlying causes," said Brody, who is now a security consultant at Input in Reston, Va.
A lot of the problems at the VA involve systemic cultural issues and an environment in which the agency's IT and security offices traditionally have had far too little authority to be really effective, Brody claimed. "Decades and decades of neglect and a fierce resistance to centralized authority are the root causes for this," he said.
The names, Social Security numbers and other personal data of 26.5 million veterans and active-duty military personnel were exposed when a laptop PC and external hard disk were stolen May 3 from the home of a VA data analyst. Both pieces of hardware were recovered last month by the FBI, which has said that the data appears to have been untouched.
Nonetheless, the VA is stilltaking heat from members of Congress who want the agency to go forward with a sweeping restructuring of its IT operations. The inspector general's 78-page report bolsters the calls for internal changes, listing lapses up and down the chain of command at the VA.
For instance, the data analyst whose house was burglarized was authorized to access VA databases, according to the report. But much of the information he had stored on the hard drive was being used for a self-initiated project he had been doing on his own time since 2003 without the knowledge of his supervisors, the report says.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts