NASA breach update: Stolen laptop had data on 10,000 users
Breached unencrypted laptop puts personal data of NASA employees and contractors at risk, spokesman says
Computerworld - Personally identifiable information of "at least" 10,000 NASA employees and contractors remains at risk of compromise following last month's theft of an agency laptop, a spokesman told Computerworld via email Thursday.
Agency employees had been told of the October 31 theft of a laptop containing the personal data from a locked car in an email message Tuesday from Richard Keegan Jr., associate deputy administrator at NASA.
In the email, Keegan told employees that the stolen laptop contained sensitive personally identifiable information (PII) on a large number of NASA employees, contractors and others. Unspecified NASA documents were also stolen from the car, he added.
"Although the laptop was password protected, it did not have whole disk encryption software, which means the information on the laptop could be accessible to unauthorized individuals," Keegan warned employees in the email.
Responding to questions from Computerworld today, NASA spokesman Allard Beutel acknowledged that agency waited nearly two weeks to publicly disclose the breach. He said that in the interim, NASA was working with law enforcement personnel to recover the laptop, and was working to determine exactly whose personal data was stored on it.
"NASA immediately began working with local law enforcement after the laptop was stolen, with the goal of recovering the computer and protecting the sensitive data," Beutel said in the agency's first public update since disclosing the theft to employees. "At the same time, NASA IT specialists and security officials began performing an exhaustive automated and manual analysis of the data to make sure everyone with information on the stolen laptop is notified."
The agency is currently in the process of notifying the victims of the breach, Beutel added.
The theft prompted questions about why personal data is stored on a laptop and why it wasn't encrypted.
The incident prompted an immediate agency-wide initiative to implement full disk encryption on all NASA laptops by Dec. 21, starting with those carried by teleworking employees.
Beutel said the laptop was stolen from a teleworking employee whose job responsibilities included reviewing personally identifiable information.
NASA does have rules stating that all individual files with PII should be encrypted, Beutel said.
However, he added, "The stolen computer was password protected, but some of the specific files were not encrypted as required by NASA policy. The hard drive also had not yet received the whole disk encryption software as part of the ongoing agency-wide effort."
Until all agency laptops are fully encrypted, NASA telecommuters must use encrypted loaner systems, Beutel said.
"Employees are being directed to review the information contained on their computers to ensure all sensitive information is appropriately encrypted at the file level, and to purge all unneeded sensitive files," he said.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts