Hey, Mom! The Explanation.

Here's the permanent dedicated link to my first Hey, Mom! post and the explanation of the feature it contains.

Friday, September 15, 2017

Hey, Mom! Talking to My Mother #801 - Equifax Breach


http://www.ksfy.com/content/news/AG-Jackley-200000-South-Dakotans-could-be-affected-by-Equifax-breach-443307573.html
Hey, Mom! Talking to My Mother #801 - Equifax Breach

Hey Mom,

I am sure my readers have all heard of the big Equifax security breach even if you have not.

Just catching up with a storehouse of newsy bits for my own reading and maybe for the benefit of others who stumble in.

First, the message that alerted me that came from one of the schools I work for.

Then a bunch of SLASHDOT bits.

Yeah, this is me catching up. Boring? Maybe. But right now, I want speed, and maybe this is a useful repository for some.

And in the end, the most recent item, it's a known bug and some kind of weird nepotism in that the Chief Security Officer had no experience in the field when hired. As someone making a career change from an unrelated field, I feel strongly that "experience" is not necessarily the end all be all of success. If a CSO is smart and on top of the work load, then bugs get fixed. If not, then not. This is not about someone without experience, it's negligence, but it may be negligence because there's not enough manpower in the department to fix everything in a timely manner and not so much negligence because of poor management.

---------- Forwarded message ----------
From: Park University Information Security 
Date: Fri, Sep 8, 2017 at 12:43 PM
Subject: Cybersecurity Tip of the week: Equifax Massive Cyber Hack!
To: 


All Park University Constituents,
The recent data breach at Equifax Credit Bureau has resulted in the exposure of millions of people’s personal data including Social Security numbers, addresses and driver licenses. Here are some tips courtesy of the Office of Information Security on what you can do to  avoid becoming a victim of identity theft.
Step 1: Find if your personal information was exposed in the Equifax breach by visiting this website. You will be prompted to provide your last name and the last six digits of your Social Security number.
Step 2: Enroll in the TrustedID  Premier credit monitoring services that Equifax is providing for free. This offer is open for a short period to everyone regardless of whether you were impacted by the breach or not.
Step 3: Place a Credit Freeze on your credit report with the three major Credit Bureau- Equifax, Experian, and Transunion.
A credit free prevent potential creditors from accessing your credit file. Because creditors do not typically offer credit before accessing your credit reporting file, freezing prevents you or others from opening accounts in your name unless you unfreeze it in advance. You can read more about and take actions through the links below:

Thank you,
Office of Information Security.







Equifax Breach is Very Possibly the Worst Leak of Personal Info Ever (arstechnica.com)401


The breach Equifax reported Thursday is very possibly is the most severe of all for a simple reason: the breath-taking amount of highly sensitive data it handed over to criminals. Dan Goodin of ArsTechnica writes:By providing full names, Social Security numbers, birth dates, addresses, and, in some cases, driver license numbers, it provided most of the information banks, insurance companies, and other businesses use to confirm consumers are who they claim to be. The theft, by criminals who exploited a security flaw on the Equifax website, opens the troubling prospect the data is now in the hands of hostile governments, criminal gangs, or both and will remain so indefinitely. Hacks hitting Yahoo and other sites, by contrast, may have breached more accounts, but the severity of the personal data was generally more limited. And in most cases the damage could be contained by changing a password or getting a new credit card number. What's more, the 143 million US people Equifax said were potentially affected accounts for roughly 44 percent of the population. When children and people without credit histories are removed, the proportion becomes even bigger. That means well more than half of all US residents who rely the most on bank loans and credit cards are now at a significantly higher risk of fraud and will remain so for years to come. Besides being used to take out loans in other people's names, the data could be abused by hostile governments to, say, tease out new information about people with security clearances, especially in light of the 2015 hack on the US Office of Personnel Management, which exposed highly sensitive data on 3.2 million federal employees, both current and retired.Meanwhile, if you accept Equifax's paltry "help" you forfeit the right to sue the company, it has said. In its policy, Equifax also states that it won't be helping its customers fix hack-related problems.

UPDATE (9/9/17): Equifax has now announced that "the arbitration clause and class action waiver included in the Equifax and TrustedID Premier terms of use does not apply to this cybersecurity incident."

Bloomberg reported on Friday that a class action seeking to represent 143 million consumers has been filed, and it alleges the company didn't spend enough on protecting data. The class-action -- filed by the firm Olsen Daines PC along with Geragos & Geragos, a celebrity law firm known for blockbuster class actions -- will seek as much as $70 billion in damages nationally.
https://yro.slashdot.org/story/17/09/08/2025259/ask-slashdot-whats-a-practical-response-to-the-equifax-breach?sdsrc=rel





Ask Slashdot: What's a Practical Response To the Equifax Breach?216


In response to the massive Equifax cybersecurity incident impacting approximately 143 million U.S. consumer -- making it possibly the worst leak of personal info ever -- Slashdot reader AdamStarksasks:What steps can the average Joe take to protect their identity? Accepting Equifax's help forfeits your right to sue; it's the same with applying for protection at TransUnion (not sure about Experian). Extra services at those companies also cost money, but that's putting even more of your data in their hands, and it's not clear whether the protection/help they provide is worth it (leaving aside not wanting to reward bad behavior).https://it.slashdot.org/story/17/09/10/195230/equifax-breach-provokes-calls-for-serious-data-protection-reforms?sdsrc=rel



Equifax Breach Provokes Calls For Serious Data Protection Reforms (wired.com)193


Equifax's data breach was colossal -- but what should happen next? The Guardian writes:The problem is that companies like Equifax are able to accumulate -- essentially, without limit -- as much sensitive, personal data as they can get their hands on. There is an urgent need for strict regulations on what types of data companies can collect and how much data a company can possess, both in aggregate and about individuals. At the very least, this will lessen the severity and size of (inevitable) data breaches... Without putting hard limits on the data capitalists who extract and exploit our personal information, they will continue to reap the benefit while we bear the risks.
Marc Rotenberg, president of the Electronic Privacy Information Center, adds, "we need to penalize companies that collect SSNs but can't protect [them]." Wired reports:Experts across numerous privacy and security fields agree that the solution to the over-collection and over-use of SSNs isn't one particular replacement, but a diverse array of authentications like individual codes (similar to passwords), biometrics, and even physical tokens to create more variation in the ID process. Some also argue that the government likely won't be the driving force behind the shift. "We have a government that works at a glacial pace in the best of times," says Brenda Sharton, who chairs the Privacy & Cybersecurity practice at the Goodwin law firm, which has worked on data privacy breach investigations since the early 2000s. "There will reach a point where SSN [exposure] becomes untenable. And it may push us in the direction of having companies require multi-factor authentication."
Meanwhile TechCrunch argues, "This crass, callow, and lazy treatment of our digital data cannot stand...":We must create new, secure methods for cryptographically securing our data... These old organizations -- Equifax was founded in 1899 and hasn't changed much since inception -- must die, to be replaced by solutions that (and I shudder to say this) are blockchain-based.

https://it.slashdot.org/story/17/09/16/0244211/equifax-cso-retires-known-bug-was-left-unpatched-for-nearly-five-months




Equifax CSO 'Retires'. Known Bug Was Left Unpatched For Nearly Five Months (marketwatch.com)


phalse phace quotes MarketWatch:Following on the heels of a story that revealed that Equifax hired a music major with no education related to technology or security as its Chief Security Officer, Equifax announced on Friday afternoon that Chief Security Officer Susan Mauldin has quit the company along with Chief Information Officer David Webb

Chief Information Officer David Webb and Chief Security Officer Susan Mauldin retired immediately, Equifax said in a news release that did not mention either of those executives by name. Mark Rohrwasser, who had been leading Equifax's international information-technology operations since 2016, will replace Webb and Russ Ayres, a member of Equifax's IT operation, will replace Mauldin.

The company revealed Thursday that the attackers exploited Apache Struts bug CVE-2017-5638 -- "identified and disclosed by U.S. CERT in early March 2017" -- and that they believed the unauthorized access happened from May 13 through July 30, 2017.

Thus, MarketWatch reports, Equifax "admitted that the security hole that attackers used was known in March, about two months before the company believes the breach began." And even then, Equifax didn't notice (and remove the affected web applications) until July 30.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Reflect and connect.

Have someone give you a kiss, and tell you that I love you.

I miss you so very much, Mom.

Talk to you tomorrow, Mom.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

- Days ago = 803 days ago

- Bloggery committed by chris tower - 1709.15 - 10:10

NEW (written 1708.27) NOTE on time: I am now in the same time zone as Google! So, when I post at 10:10 a.m. PDT to coincide with the time of your death, Mom, I am now actually posting late, so it's really 1:10 p.m. EDT. But I will continue to use the time stamp of 10:10 a.m. to remember the time of your death, Mom. I know this only matters to me, and to you, Mom.

No comments: