Join today and have your say! It’s FREE!

Become a member today, It's free!

We will not release or resell your information to third parties without your permission.
Please Try Again
{{ error }}
By providing my email, I consent to receiving investment related electronic messages from Stockhouse.

or

Sign In

Please Try Again
{{ error }}
Password Hint : {{passwordHint}}
Forgot Password?

or

Please Try Again {{ error }}

Send my password

SUCCESS
An email was sent with password retrieval instructions. Please go to the link in the email message to retrieve your password.

Become a member today, It's free!

We will not release or resell your information to third parties without your permission.

Route1 Inc V.ROI

Alternate Symbol(s):  ROIUF

Route1 Inc. is a technology company that enables its clients with data-centric solutions. It brings security and operations together with real-time actionable intelligence to enhance safety and security, drive profitability and improve operational efficiencies. It is engaged in software development, network operations, and cybersecurity. It provides advanced data in a usable format from video capture technologies to enhance safety and security and improve operational efficiency. Its solutions include enterprise solutions and smart communities. Its AutoVu ALPR (advanced license plate recognition), manages its parking lots with pay-by-plate technologies. Its surveillance and video intelligence technology includes Omnicast, Stratocast, Body-Worn Cameras, In-Car Video and Synergis Access Control. Its Security Center Synergis IP access control connects to third-party access control devices. Its services include advisory and analysis, project management, design and engineering and others.


TSXV:ROI - Post by User

Bullboard Posts
Post by trytomakeabuckon Jan 24, 2013 8:48am
378 Views
Post# 20882823

NASA SECURITY BREACH SHOULD BE WAKE UP CALL

NASA SECURITY BREACH SHOULD BE WAKE UP CALL

By Tony Busseri | Jan. 21, 2013

 
 
 

The recent breach at NASA from a stolen laptop is the latest in a number of alarming, high-profile breakdowns resulting from antiquated policies for security, identity management and remote access. The password-protected asset was taken from a teleworking employee whose job responsibilities included reviewing personally identifiable information.

Computerworld reported that this breach prompted an immediate agencywide initiative to implement full disk encryption on all NASA laptops, starting with those carried by teleworking employees. While I applaud the NASA team for taking action, their plan to encrypt laptops was an insufficient response to a breach of this nature, and symptomatic of a nationwide epidemic.

Government agencies across the country that manage the most sensitive information must accept a simple truth: Data of a confidential nature should never be allowed to leave the safe confines of the enterprise’s network. This is a far better approach to ensuring that private files are not exposed to unauthorized access or unnecessary risk.

The security and financial consequences of weak policies or protocols should sound an alarm that the current thinking in regard to security is flawed — to put it mildly.

Also of note is the conclusion of leading security analysts that among the top reasons for data breaches was loss of a laptop or mobile device, or third-party mishaps — a logical supposition when you consider that regardless of their education, training or security clearance, people are still “only human.”

Individuals make mistakes every day — it’s an indisputable fact of life. Accordingly, without the appropriate technology in place, there is no policy, mandate or executive directive capable of completely protecting an organization from breaches. This must be realized and effective technology must be deployed, or we will continue to see the same story over and over again.

According to “A Chronology of Data Breaches,” a report published in July by the Privacy Rights Clearinghouse, the total number of records containing sensitive personal information involved in security breaches in the U.S. had reached 562,943,732 since January 2005. Gartner Group forecasted that through 2016, the financial impact of cybercrime would grow 10 percent per year due to the continuing discovery of new vulnerabilities.

The impetus on across-the-board government cost-cutting in 2013, coupled with a rise in the number of federal teleworkers (and contractors), should motivate administrators to be proactive and take preventative technological measures. Further, there must be a wholehearted paradigm shift in the overall philosophy on data entitlement, as well as how files are accessed and managed.

Remote workers should be empowered with tools that provide them with an identical user experience to perform their duties as if they were onsite, but no data should ever be downloaded onto an external USB drive, laptop or smartphone, thereby eliminating any risk of cache, file transfer, middleware or cyber footprint. In addition, remote access should be based on the identity of an individual — not the device.

In an article for the information security website Dark Reading identifying the top 10 government breaches of 2012, Ericka Chickowski notes that “the circumstances [of the NASA breach] offer glaring evidence of how government agencies still lag in employee awareness and training. Personally identifiable information was left on an unencrypted agency laptop, which was subsequently stolen. … When large caches of information are transferred from the database, who knows where they’ll end up. The NASA breach shows once again how easy it is for unencrypted information on laptops to ‘walk away’ from authorized users.”

Well said.

This incident should serve as a wake-up call for government and private business in terms of how they protect their most sensitive assets and data files. Without the proper technology, there is no possible way to enforce security policies and protocols.

Unfortunately for many organizations, the reality of today’s computing environment is that security is a punchline without any entitlement management component, which allows for data to leave the friendly confines of their respective networks.

Digital security is about risk management and mitigation, and should be looked at through the same filter as any other risk management subject decision. There are two central questions to address:

  • What is the cost to the organization of doing nothing?
  • What are the upfront and ongoing costs or savings associated with a new investment in a more effective security solution?

As has been shown, the cost of complacency can be crippling on multiple levels. The organizations that think they have time before investing in a sound security policy and technology will undoubtedly find themselves on the wrong side of an attack or breach. There are just too many potential threats, with the extent of damage they can cause growing exponentially.

In 2013, universal security, data management and protection must be top priorities for the U.S. government. The growing contingency of teleworkers will amplify not only the risk of breaches caused by lost devices (encrypted or not) but also the prevailing allowance of employees to “bring your own device” (BYOD).

We all know that there is no such thing as perfect security, but that is no excuse for the inadequate protocols and lack of the right technologies being used more often than not.

 

Tony Busseri is chief executive of Route1, a Toronto-based digital security and identity management company whose clients include the U.S. departments of Defense, Homeland Security and Energy and the Canadian federal government.

 

Bullboard Posts