NASA scrambles to encrypt laptops after major breach
Personally identifiable information on NASA employees, contractors exposed in Oct. 31 laptop theft; workers told of incident this week
Computerworld - NASA is scrambling to implement full disk encryption on agency laptops after one containing unencrypted personal information on a "large" number of people was recently stolen.
Agency employees were told of the October 31 theft of the laptop and NASA documents from a locked car in an email message Tuesday from Richard Keegan Jr., associate deputy administrator at NASA.
Keegan told employees that the stolen laptop contained sensitive "Personally Identifiable Information" (PII) about a large number of NASA employees, contractors and others.
"Although the laptop was password protected, it did not have whole disk encryption software, which means the information on the laptop could be accessible to unauthorized individuals," Keegan warned.
"We are thoroughly assessing and investigating the incident, and taking every possible action to mitigate the risk of harm or inconvenience to affected employees," he added.
NASA has hired data breach specialist ID Experts to help notify all of the individuals affected by the breach, Keegan said.
Those whose personal data could be accessed by the crooks will receive free credit monitoring and identity theft monitoring services as well as an insurance reimbursement policy in case of identity theft.
NASA did not respond to a request for information on how many employees were affected, or why the agency waited nearly two weeks to disclose the breach.
The incident marks the second time this year that a NASA laptop containing unencrypted sensitive information was stolen.
In March, a laptop containing names, Social Security Numbers, phone numbers, email addresses, dates of birth, college GPAs and other personal data of NASA employees at NASA"s Kennedy Space Center was stolen from the car of a worker at the facility, according to NASA Watch.
That breach also impacted a large but unspecified number of employees.
The latest incident appears to have finally pushed NASA to mandate full disk encryption on laptops containing sensitive data.
In his alert, Keegan noted that NASA Administrator Charles Bolden and CIO Linda Cureton have issued a directive prohibiting the removal of computers from a NASA facility unless whole disk encryption is enabled or all sensitive files are individually encrypted.
The directive applies to all laptops containing PII, data on International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR) data, procurement and human resources information, and other sensitive but unclassified (SBU) data, Keegan said.
CIOs at all NASA facilities have been instructed to complete disk encryption on the "maximum possible number of laptops" by Nov. 21, Keegan said, and to add encryption capabilities to all laptops by Dec. 21. After that date, no laptop from any NASA facility, unless whole disk encryption is enabled.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts