Forget hackers; companies responsible for most data breaches, study says
More than 1.9B records compromised in the past 26 years
Computerworld - In the five minutes it might take to read this article, about 672 electronic records containing confidential information will be compromised. By year's end, more than 72 million records with Social Security numbers, credit card numbers, birth dates and other personal data will have been exposed. That rate is about 200,000 more records per month than last year.
And the main culprit is not the oft-vilified rogue hacker, but corporate America, according to a new study by the University of Washington, Seattle.
That conclusion is based on a review of 550 security breaches reported in major U.S. news media outlets from 1980 to 2006. The goal of the study was to examine the role of organizational behavior in privacy violations. It showed that internal foul-ups such as putting personally identifiable information accidentally online, missing equipment, lost backup tapes or other administrative errors were responsible for 61% of the incidents.
In contrast, just 31% of the incidents were perpetrated by external hackers; 9% had unspecified causes.
"What this shows is that a surprising number of incidents actually involve corporate mismanagement more than hackers," said Philip Howard, assistant professor of communication at the University of Washington and co-author of the report. "I think it is easier when your company loses a lot of client data to put an immediate spin on it and blame it on a hacker or some external guy using some ingenious hacking technique."
The reality, though, is that in more cases than not, internal errors caused the data breach, he said.
Howard's study reinforces similar findings from other research. A report released last week by the IT Policy Compliance Group showed that human error is the overwhelming cause of losses of sensitive data -- contributing to 75% of all occurrences, while malicious hacking activity contributed to just 20% of data losses. According to that report, the primary channels for data loss involve laptops and mobile devices as well as e-mail and instant messages.
Similarly, in an informal survey of attendees at last week's Computerworld Premier 100 IT Leaders Conference, respondents picked "activities by internal staffers" as the biggest source of security breaches, followed by "ineffective policies" and "sloppy mobile workers." External hackers were fingered as the source in just 11% of the cases.
Even in incidents that were publicly blamed on external hackers, the reality is a bit more nuanced, Howard said. One example was the huge data breach at Acxiom Corp. in 2003, when an external data broker stole 1.6 billion customer records containing names, addresses and e-mail addresses belonging to millions of Americans. In that case, the hacker was able to get at the records largely because of a failure by Acxiom to establish proper access controls, Howard said. Though the incident was recorded as an external hack, in reality, it was enabled by an internal error, he said.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts