This highlights the real problem. Anyone can cause a data breach - whether wittingly or not. As computing becomes pervasive, with data being accessed, worked on, saved and sent from almost any location, it’s not just the notional ‘bad guys’ we need to protect against: it’s ordinary people too.
Because we all make mistakes. We think it will be OK to bend the rules, just this once. And unfortunately, one such incident is all it takes to make a business-threatening data breach. Let’s take a closer look at just some of the types of people, and everyday circumstances, that can present this type of security risk.
Can I take that with me?
The overwhelming majority of data leaks reported in the UK over the past year happened because ordinary employees copied data to disks or devices that they shouldn’t have. It’s easy to do, and in most cases, is done innocently. But it’s the first step towards a breach.
In November 2007, Check Point surveyed 140 IT managers and directors in British public and private sector companies. 73% said their published IT security policy covered data protection issues such as use of USB drives. Less than half the sample had any solutions in place (such as data encryption, or port control) that would actually enforce those policies. It’s no surprise that people will continue copying data. They’re just trying to work as efficiently as they can, aren’t they? But unless policies are actively enforced by the use of IT solutions, leaks will continue to happen.
Last month, the US Department of Homeland Security confirmed what some weary travellers already know: border agents are allowed to search through files on your laptop, Blackberry, smart phone or any other digital device when you enter the country – even when there is no ‘reasonable cause’. Officials can keep data or the entire computer, copy what they want and share this data with other agencies. Even if that data is encrypted, are you really going to refuse to give the password? How far will quoting your rights take you? Of course, if the data is not suspicious, guidelines say the copied data should be destroyed. Can you be sure of this? And given the recent track record of Government bodies losing sensitive data, would you want your data in their hands?
Internet kiosks and terminals in departure lounges are a sore temptation for many business travellers. It’s a last chance to check emails before that long flight, or make last-minute changes to an important presentation. After all, it’s just making best use of down time. What happens to that sensitive data after the person’s finished with the computer? Is the data really permanently wiped from memory? Did they leave a USB stick behind? What are the implications for the company’s security policies if such data is being processed on an unsecured PC? Sometimes, it’s a company’s top guns that take the biggest risks with data.