S.C. governor's post-breach data encryption claims are off-base, analysts say
Gov. Haley calls encryption a cumbersome practice that's not followed even by many banks
Computerworld - Security analysts this week challenged South Carolina Governor Nikki Haley's defense of the state's information security practices in the wake of a data breach at the S.C. Department of Revenue that exposed the Social Security Numbers (SSNs) of 3.6 million people.
In a news conference Monday, Haley insisted that the state was following industry practices when it decided not to encrypt SSNs and other personal taxpayer information stored on state computers.
"The industry standard is that most SSNs are not encrypted," Haley said in response to a question from a reporter. "A lot of banks don't encrypt, a lot of those agencies that you think might encrypt Social Security Numbers actually don't, because it is very complicated. It is cumbersome and there's a lot of numbers involved with it."
Haley went on to add that the encryption issue affected not just the South Carolina Department of Revenue but other organizations across all industries.
The state followed the same security standards as other organizations and there's little it could have done to fend off the attack, she said. "If the CIA can be hacked, anybody can be hacked."
Haley's news conference, and one held earlier today, came after the state disclosed Friday that unknown hackers from overseas had broken into a Department of Revenue database and accessed SSNs and other personal data belonging to 3.6 million people.
Another 387,000 credit and debit card numbers belonging to taxpayers were also exposed in the September attack. According to state officials, the SSNs weren't encrypted, though all but 16,000 of the credit and debit cards that were compromised had been encrypted. State officials first discovered the breach on Oct. 10, but did not disclose it until Friday on the advice of state and federal investigators. Anyone who has filed a South Carolina tax return since 1998 has likely been affected.
The state has agreed to offer free credit monitoring services and up to $1 million in identity theft insurance coverage for victims of the breach. More than 287,000 people have already signed up for the service, Haley said.
Avivah Litan, an analyst with Gartner, called the governor's defense of the state's security practices shaky. "It's true that most banks don't encrypt customer data, largely because of performance hits and management overhead," Litan said.
"But most banks do a decent job of instituting strong protections around sensitive customer data at rest," she said, noting that encryption is only one method for protecting data. "There are many other methods that are viable and, when used together, offer more protection than just encryption alone.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts