veritas_libertas wrote: » *Warning I didn't read the article. TL;DR* Because if you are hacked means you didn't do everything right... Sorry, even if you do your best you may still get compromised. The important question is, how long will it take for you to detect it? I dislike the idea of blaming the victim. If they were negligent sure, but if they did their best and a hacker still got in that's different. Even a bank with guards can still experience an armed intruder(s) that rob them and run off with the money.
veritas_libertas wrote: » JUST the CDC? LOL... Based on the last few years I'd say their security practices need work...
Deathmage wrote: » Gov't as a whole, I was being kind.
Deathmage wrote: » What I find contradictory of all this is the FTC will go after a private sector company for a data breach but the FTC should be going after Gov't infrastructure more too. Gov't infrastructure is so in the stone ages with security it's not even funny.
eSenpai wrote: » Aye, but the OPM situation does mirrors almost every business segment out there today in that far too many businesses are running systems that need to be moth balled. Almost every shop has a server or application they simply can't (won't) replace.
tpatt100 wrote: » A big problem with the government is that all of the different departments have to fight for their budgets so not all agencies are funded appropriately so there are agencies with various levels of security. I remember seeing a contract request online for bringing all of the different state Medicaid systems into one platform. The contract listed probably a dozen different systems of various eras that I think handled filing Medicaid claims. It looked like a pretty epic challenge to migrate all of these semi current and legacy systems into one current standard.
thomas_ wrote: » Are there ever any class action lawsuits against these companies that have huge security breaches?
gespenstern wrote: » Didn't read the article, but. Right now companies have close to zero incentive to fight breaches. Let's talk about Target which is a good example. A ton of things were wrong in this company: 1. No CISO. 2. IT analysts outsourced to India fail to detect things happening. 3. No DLP or DLP not configured, CC data was exfiltrated in plain text and nobody caught anything. 4. No IDS/not configured IDS (there was a rumor that they have FireEye), that didn't catch clear indication of things happening on the network. 5. Outdated Windows XP Embedded for POS devices. 6. No trusted execution configured on POS devices. 7. Malicious service created on ~25 POS multiplied by ~1800 stores at once and nobody caught it. 8. CIO was a long-time employee with business/salesperson background and no IT knowledge whatsoever. What are their damages? $61 million in lawsuits and other damages. Compare this figure to their yearly net profit which is >2 billions. The most serious impact was because citizens decided not to go to Target and buy stuff there for around 2-3 months and net profits made missed expectations, during 4th fiscal 2013 quarter (ended on 1st of February 2014) their net profits were down 46% compared to previous year. They have fully recovered their profits and share price in spring 2014 Don't forget that they didn't leak their data. They leaked our CC data and who suffered here the most were "guests" (those of us who used debit cards and lost money that crooks stole from debit cards) and banks (who's responsible for money stolen from credit cards). Target leaked nothing of their own. So what incentive do they have to detect and prevent breaches and how much money they would be willing to spend towards this? Rhetorical question.
eSenpai wrote: » Hmmm....this was not my understanding of the investigation at all. According to the Killchain report given to the Senate committee Target actually had a lot of these things in place.
eSenpai wrote: » As to the CISO thing, sadly they still have not learned their lesson in that the new CISO reports to the CIO.