<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; cloud services</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/cloud-services/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>When data recovery becomes a data disaster</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/21/when-data-recovery-becomes-a-data-disaster/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/21/when-data-recovery-becomes-a-data-disaster/#comments</comments>
		<pubDate>Tue, 21 Feb 2012 23:39:04 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cloud services]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=991</guid>
		<description><![CDATA[Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into data breach scams. According to a recent report [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F21%2Fwhen-data-recovery-becomes-a-data-disaster%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cloud+services,Data+Breach,Data+Security,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/lost-data.jpg"><img class="aligncenter size-full wp-image-1003" title="lost_data" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/lost-data.jpg" alt="" width="385" height="312" /></a></p>
<p>Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course.</p>
<p>Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into <a title="Data Breach Scams" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/">data breach scams</a>. According to a recent report from the <a title="Ponemon article_Trends in security of data recovery" href="http://www.darkreading.com/insider-threat/167801100/security/news/232400100/2012-ponemon-report-on-trends-in-security-of-data-recovery.html" class="broken_link" rel="nofollow">Ponemon Institute</a>, organizations are overlooking security precautions when turning to third-party data recovery services, prioritizing speed over safety at their own peril. And that peril can come in the form of a major disruption in business,<a title="EDB blog" href="http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/"> financial loss</a>, and in some cases the closure of the affected company.</p>
<p>Ponemon’s recent “Trends in Security of Data Recovery Operations,” which surveyed 769 IT professionals, noted that 87% of respondents had experienced a data breach in the past two years. Of these respondents, 21% admitted that the breach occurred while the drive containing the data was with a third-party data recovery service.</p>
<p>The report also found that:</p>
<p>• 85% of respondents report that their organizations have used or will continue to use a third-party data recovery service provider to recover lost data, with 39% saying they use third parties at least once each week or more.</p>
<p>• 54% of respondents confirmed that IT security is excluded from selecting third-party data recovery providers, which could play a role in IT support’s placement of speed over security. 81% of respondents said that speed of recovery was the most important factor in choosing a vendor, with 75% stating that the ability to successfully recover data was the paramount concern.</p>
<p>• 54% of respondents do not require third-party data recovery vendors to comply with leading security guidelines.</p>
<p>• 83% of respondents agreed that third-party vendors should be required to ensure that data is securely and permanently destroyed from their systems after the information has been recovered, but only 9% actually do so.</p>
<p>The report recommends that organizations institute policy and guidelines for selecting and using a data recovery service provider. This includes precautions such as agreements for <a title="EDB blog_cloud computing" href="http://www.experian.com/blogs/data-breach/2011/07/19/trouble-in-the-clouds-data-breaches-threaten-cloud-computing/">cloud storage providers </a>that outline the need for notification should a data loss occur and a data recovery service provider is hired. If third-party recovery service providers don’t adhere to the strictest data security guidelines, the healthcare, government and financial organizations that hire them could be in breach of the laws that bind them to the highest security standards.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/21/when-data-recovery-becomes-a-data-disaster/&via=Experian_DBR&text=When data recovery becomes a data disaster&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F21%2Fwhen-data-recovery-becomes-a-data-disaster%2F&amp;title=When%20data%20recovery%20becomes%20a%20data%20disaster" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/21/when-data-recovery-becomes-a-data-disaster/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Expanding the scope of security testing</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/15/expanding-the-scope-of-security-testing/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/15/expanding-the-scope-of-security-testing/#comments</comments>
		<pubDate>Wed, 15 Feb 2012 18:37:33 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cloud services]]></category>
		<category><![CDATA[continual testing]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[PII]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=967</guid>
		<description><![CDATA[Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F15%2Fexpanding-the-scope-of-security-testing%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,cloud+services,continual+testing,Cyber+Security,Data+Security,hackers,PII&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/secure_network2.jpg"><img class="aligncenter size-full wp-image-976" title="Secure Network" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/secure_network2.jpg" alt="" width="432" height="324" /></a></p>
<p><em>Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of </em><a title="Security Constructs" href="http://www.securityconstructs.com/" rel="nofollow" target="_blank" class="broken_link"><em>Security Constructs LLC</em></a><em>, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System.</em></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.</p>
<p>To broaden that scope, today security and risk professionals are taking a cue from software engineers and using a type of testing known as attack surface analysis. Rather than focusing on a specific point in time like the penetration test, this test views the network as a fluid system.</p>
<p>Attack surface analysis uses an entry and exit point framework to identify the full extent of a system’s attack surface.  This analysis is done on either computing or business process resources. In either instance, the entry/exit points of a system are the ways through which data (or hackers) enters or leaves a system and are the basis for attacks.</p>
<p>Some attacks may even use both computing process and business process entry/exit points. For example, a hacker goes to a department store and applies for a job. While there, he inserts a USB thumb drive loaded with malware or auto-execute code into an unprotected USB slot on a nearby computer.</p>
<p>The malicious code executes and gives him a foothold into the enterprise systems that he can then exploit remotely. In this scenario, the hacker has essentially completed an attack surface analysis on the store’s business process and located an unprotected USB slot. He has also done the same for the computing process though, in this scenario, he has created a new attack surface rather than using part of the existing one.</p>
<p>As a CISO, I identify the most important data sets and map the attack surfaces to those data sets. For example, the personally identifiable information (PII) of your employees may be of primary concern to your enterprise. To conduct an attack surface analysis, I would look at the systems that contain this data AND how and by whom that data is used. Is the data static or does it move between enterprise systems? If so, what are the business processes that require this data movement and what are the pipelines through which it moves? Viewed in this fashion I see a more fluid attack surface with connected entry and exit points – not just a single one at a time.</p>
<p>Fortunately there are tools to assist with the process. As more and more enterprises use cloud-based or Web-based services, we can take advantage of the Open Web Application Security Project (OWASP) framework for Web applications. <a title="Open Web Application Security Project" href="https://www.owasp.org/index.php/Main_Page" rel="nofollow" class="broken_link">OWASP</a> is highly respected in the information security space. Its open source tools identify all entry points into a program but do so in a well-structured manner that encourages analysis. It maps both roles and resources to each entry point. It is designed to be used throughout the lifecycle of the system under review. I use the concepts of OWASP to map roles and resources for the supporting business processes of these same applications.</p>
<p>For a more risk-based view of attack surface analysis, I use the Open Source Security Testing Methodologies Manual (OSSTMM) tool, run by Pete Herzog and his team in Spain. It is exactly what it states – an open source community providing an entire security testing framework. OSSTMM is the tool created and maintained by the Institute for Security and Open Methodologies (<a title="Institute for Security and Open Methodologies Manual" href="http://www.isecom.org/research/osstmm.html" rel="nofollow" class="broken_link">ISECOM</a>). I&#8217;ve personally used this framework for many years in a wide range of enterprises. Its beauty is the completeness of the OSSTMM with framework, templates worksheets and Risk Assessment Value (RAV) spreadsheet.</p>
<p>The RAV is what assists us in attack surface analysis. The RAV provides a mechanism where you can place risk values for all of the computing and business process attack entry/exit points. The RAV spreadsheet then provides an overall risk score that aids in prioritizing your attack surface resolution action plan. While the risk scores may not be perfect at times, it is an excellent tool to guide your actions and give you a more holistic view of your system and its weaknesses.</p>
<p> <div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach 24 Hour Checklist by Experian" href="http://www.experian.com/data-breach/landing/first-24-hours.html?WT.srch=ecd_dbres_blog_021512_article ">Download this free checklist to learn what steps to take when it&#8217;s go-time for data breach response. </a></div></div></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/15/expanding-the-scope-of-security-testing/&via=Experian_DBR&text=Expanding the scope of security testing&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/15/expanding-the-scope-of-security-testing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>