S.C. governor's post-breach data encryption claims are off-base, analysts say
Gov. Haley calls encryption a cumbersome practice that's not followed even by many banks
Computerworld - Security analysts this week challenged South Carolina Governor Nikki Haley's defense of the state's information security practices in the wake of a data breach at the S.C. Department of Revenue that exposed the Social Security Numbers (SSNs) of 3.6 million people.
In a news conference Monday, Haley insisted that the state was following industry practices when it decided not to encrypt SSNs and other personal taxpayer information stored on state computers.
"The industry standard is that most SSNs are not encrypted," Haley said in response to a question from a reporter. "A lot of banks don't encrypt, a lot of those agencies that you think might encrypt Social Security Numbers actually don't, because it is very complicated. It is cumbersome and there's a lot of numbers involved with it."
Haley went on to add that the encryption issue affected not just the South Carolina Department of Revenue but other organizations across all industries.
The state followed the same security standards as other organizations and there's little it could have done to fend off the attack, she said. "If the CIA can be hacked, anybody can be hacked."
Haley's news conference, and one held earlier today, came after the state disclosed Friday that unknown hackers from overseas had broken into a Department of Revenue database and accessed SSNs and other personal data belonging to 3.6 million people.
Another 387,000 credit and debit card numbers belonging to taxpayers were also exposed in the September attack. According to state officials, the SSNs weren't encrypted, though all but 16,000 of the credit and debit cards that were compromised had been encrypted. State officials first discovered the breach on Oct. 10, but did not disclose it until Friday on the advice of state and federal investigators. Anyone who has filed a South Carolina tax return since 1998 has likely been affected.
The state has agreed to offer free credit monitoring services and up to $1 million in identity theft insurance coverage for victims of the breach. More than 287,000 people have already signed up for the service, Haley said.
Avivah Litan, an analyst with Gartner, called the governor's defense of the state's security practices shaky. "It's true that most banks don't encrypt customer data, largely because of performance hits and management overhead," Litan said.
"But most banks do a decent job of instituting strong protections around sensitive customer data at rest," she said, noting that encryption is only one method for protecting data. "There are many other methods that are viable and, when used together, offer more protection than just encryption alone.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Cybercrime and Hacking White Papers | Webcasts