Texas comptroller takes blame for major breach
Breach that exposed Social Security numbers of 3.5 million Texans has already led to firing of two IT execs
Computerworld - Days after firing two IT managers after a data breach exposed the Social Security numbers and other personal data of more than 3.5 million Texans, Texas Comptroller Susan Combs took personal responsibility for the incident.
In a statement issued by her office on Thursday, Combs apologized for the debacle and said her office would cover the cost of identity monitoring and restoration services for anyone affected by the breach.
The free credit-monitoring services are available starting today.
"I am deeply sorry this incident occurred and I take full responsibility for it," Combs said in the statement. "This incident has affected the lives of Texans that I have dedicated my life to serving, and I am determined to restore their faith in the Comptroller's office."
Earlier this month, Combs' office disclosed that Social Security numbers, driver's license numbers, and the names and addresses of more than 3.5 million Texas residents had been inadvertently exposed on a publicly accessible website for nearly a year.
The exposed data was included in files sent to the state comptroller's office by the Teacher Retirement System of Texas, the Texas Workforce Commission and the Employees Retirement System of Texas for use in a property verification system. The data was mistakenly sent unencrypted to the comptroller's office.
Following the discovery of the breach, the heads of information security and of innovation and technology at the comptroller's office were fired, and Deloitte Consulting and Gartner were hired to review its security measures and recommend changes.
Combs also said that her office will be implementing a series of additional measures -- including the installation of new data leak prevention software and an enhanced file-transfer system featuring robust encryption capabilities -- to mitigate the chances of a similar incident occurring.
The comptroller's office will also be adding staff, including a new chief privacy officer, and reorganizing internal reporting structures to strengthen security, Combs said. The chief privacy officer will work with the office's CTO, information security officer and internal auditor to shore up privacy practices, she added.
The breach has already cost the comptroller's office more than $1.8 million and could end up costing a whole lot more, according to reports.
So far, the state has spent $1.2 million on sending out notification letters, close to $300,000 for Gartner's and Deloitte's services, and another $393,000 to set up a call center for handling queries from those affected by the breach, according to the Austin American-Statesman's website.
In addition, the website noted that the identity monitoring service being offered by Combs' office could cost up to $21 million if everybody enrolls in it. Combs has stated that she will bear the cost of identity restoration services from her own campaign funds, the publication noted.
Combs' office did not respond to a request for confirmation of the estimated costs listed on Statesman.com.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- Hackers steal user data from the European Central Bank website, demand money
- Arrests made after international cyber-ring targets StubHub
- SQL injection flaw opens door for Wall Street Journal database hack
- Goodwill Industries probes possible payment card breach
- Aloha point-of-sale terminal, sold on eBay, yields security surprises
- The biggest data breaches of 2014 (so far)
- Blue Shield discloses 18,000 doctors' Social Security numbers
- PF Chang's says breach was 'highly sophisticated criminal operation'
- Breaches exposed 1 in 7 US debit cards in 2013
- New malware program targets banking data
Read more about Security in Computerworld's Security Topic Center.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!