Filter by Category

Cyber Threats: The Truth Beyond the Entertainment Value

On June 8th, 2010, National Public Radio (NPR) broadcast a debate by the public charity Intelligence Squared U.S. (IQ2US) entitled "The Cyber War Threat Has Been Grossly Exaggerated." The show's format is based on the traditional Oxford-style debate, with one side proposing and the other side opposing a sharply-framed motion.

The broadcast pit Marc Rotenberg (executive director of the Electronic Privacy Information Center) and Bruce Schneier (a security technologist) against Jonathan Zittrain (a Harvard Law School professor) and former U.S. Director of National Intelligence Mike McConnell. Zittrain and McConnell rolled out the heavy security artillery, describing the threats and touting facts and figures, while Zittrain and Schneier questioned the seriousness of the threat and tried to cast suspicion on the C.I.A., claiming they want to spy on us.

The debate was both entertaining and informative, but it also shed light on an unusual dichotomy in our public subconscious regarding cyber security: as denizens of computer technology, we're as wary as Jason Bourne about where our cyber security threats are coming from. Are they coming from real terrorists and enemy spies? Is there really some vast criminal conspiracy afloat? Or are these threats coming from the very ranks of government itself?  Who do you really trust and why?

Even the term "cyber" is a subconscious mnemonic to the old Marvel Comics supervillain of the same name. In the comics, Cyber, alias Silas Burr, was an agent of the Pinkerton Detective Service before he turned into a criminal mastermind. Why wouldn't we be suspicious of government representatives telling us that we're engaged in a kind of comic book war?

But data security is obviously not an issue about comic book supervillains or government conspiracies. For example, in the same month that IQ2US aired their debate, many received notices about a class action settlement. Countrywide Financial, the behemoth that sold mortgages during the real estate bubble and is now owned by Bank of America, had begun the process of contacting customers whose identities may have been stolen when their records were pilfered by an employee.

No, it wasn't Jason Bourne or Silas Burr, but a former Countrywide senior financial advisor who wanted to sell the names, social security numbers, credit information, employment history, and other personal information of mortgage applicants.

The U.S. District Court's remedy in the settlement will be to require Countrywide to provide free credit monitoring of all those involved in the class action suite for a period of 2 years, along with a potential liability against Countrywide of up to $50,000 for each incident of identity theft.

Isn't it time we, in our organizations, got serious about data encryption? Shouldn't we be stepping into this battlefield to fight back with a secure, managed file transfer system between our workstations and servers?

The cyber wars of comic books may populate our imagination, but our company's challenges are much more real. And if we're not mindful to use the right tools in our IT departments, we may all be faced with a customer base of angry Jason Bournes who have lost their identities through our security lapses.

(Listen or watch the televised debate produced by Intelligence Squared U.S. (IQ2US), entitled "The Cyber War Threat Has Been Grossly Exaggerated," here.)

 

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


Recent 2018 Data Breaches in Healthcare (and How to Avoid Them)

November 14, 2018

Phishing attacks, malware, and employee errors. These are three of the most recent causes for healthcare data breaches in 2018, with more certainly to come. The year isn’t over yet. For anyone…


Which is Better: SFTP vs. MFT?

November 6, 2018

SFTP, or MFT: that is the question. Even though we’re not all famous poets like William Shakespeare, many IT professionals will ask this question at some point or another. Should they use an…


What You Need to Know about the California Consumer Privacy Act (CCPA)

October 30, 2018

Businesses be aware: if you’re located in California or work with customers from California, a new privacy act similar to the GDPR is coming for you. This gives you just 14 months to analyze…


The Best Cybersecurity Strategies for Banks and Financial Organizations

October 18, 2018

Banks and financial institutions, take note: though the year is almost over, no one is safe from a data breach. Industries across the board have seen 4.5 million records stolen so far in 2018—a…


What is Managed File Transfer (MFT)?

October 10, 2018

As companies recognize a need for a solution that meets their file transfer, automation, and encryption needs, the question often arises: what is managed file transfer and how is it different from my…