Why wait for the next data security horror story?
“Government hacking is taking place right now behind the scenes.”
These are the words of LulzSec, the group at the centre of some high-profile news stories about ‘hacktivism’ in recent weeks. UK-based and international public sector institutions that have recently fallen victim to hacking attacks include the CIA, the US Senate, the EU, and Britain’s Serious Organised Crime Agency (Soca).
LulzSec claimed to have brought down the CIA’s website, and to have used a denial-of-service (DoS) attack to overload Soca.gov.uk with web requests. Soca had to take its website offline to prevent the attack from affecting other clients hosted by its service provider.
Other types of attack can result in public sector organisations having confidential information, including email addresses, passwords and phone numbers, stolen and then leaked. LulzSec recently warned the NHS that its networks are vulnerable to cyber-attack. It seems that hackers are good at identifying weaknesses – underestimate them at your peril.
Public sector data at risk
Clearly, data security is something that public sector organisations must take seriously. Missing laptops are just the tip of a huge iceberg of risk. Yet while reports suggest that data security budgets remain more or less intact, it is also clear that public sector organisations aren't being proactive enough about protecting their systems. It’s as if they are waiting for something terrible to happen before they decide to do something about it. If nothing happens, they will carry on as normal.
Obviously some public sector organisations have less time to spend on data security than they would like, but it still makes more sense to prevent an attack from ever happening than to let it happen and then panic about it at the last minute under intense media scrutiny.
Organisations that take preventative measures are also in a much better position to avoid being fined by the Independent Commissioners Office (ICO) for breaching the Data Protection Act. One council was recently fined £120,000.
The message is this: don’t wait until your data has been hacked; it’s better to make sure the attack doesn’t occur in the first place. And the case for prevention is stronger still when you consider how quickly and cost-effectively an organisation can implement preventative measures.
Preventing future security breaches
The most common ways in which networks are compromised are through weak password policies, un-patched systems or badly configured firewalls and intrusion prevention systems. Penetration testing is one simple precaution that public sector organisations can take to see which areas of its own security are compromised. An engineer checks the internal and external infrastructure, including web applications, to see if he or she can gain any level of unauthorised access. If desired this can even extend to social engineering, where an engineer will turn up unannounced and try to gain access to the network under false pretences.
Public sector organisations are often surprised to see which of their assets are already publically discoverable. By having an engineer attempt to penetrate your systems, you can identify where your network is strong and where it is exposed. It helps you to prioritise how to improve network security and make the most of your IT security budget. And a good engineer will make sure you have the knowledge and skills you need to check the network yourself on an on-going basis.
Taking this sanity check doesn’t cost a lot of money; it’s certainly a sensible investment when you consider what a public sector organisation might otherwise have to spend at the last minute to pick up the pieces following a hacking attack and mend its shattered reputation with the media, the public and individuals whose privacy has been breached.
It makes sense to check, at the same time, that:
• your internet access is controlled with an intelligent web solution,
• you are aware of all the applications running on your network,
• you have spam controls in place, and
• you adhere to all the relevant compliancy regulations.
Time to take action
Leaving sensitive data unencrypted can cause serious, long-term damage to an organisation and its reputation. A good data security provider will be able to prevent this from happening, implementing security at the device level, the network gateway level, and at the level of the client device within the secure network. The best time to act is now.