{"id":6458,"date":"2017-02-01T09:11:07","date_gmt":"2017-02-01T17:11:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/01\/news-295\/"},"modified":"2017-02-01T09:11:07","modified_gmt":"2017-02-01T17:11:07","slug":"news-295","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/01\/news-295\/","title":{"rendered":"Why do I care about someone else&#8217;s data breach?"},"content":{"rendered":"<p>Because as the size of your organization increases, the probability that an individual employee\u2019s company email is in that breach rises to 1. That lone employee is going to be suffering some unfortunate impacts, from identity theft, financial scams, blackmail, and even death threats (as seen in the Ashley Madison breach). There\u2019s an organizational impact as well: a single compromised account can serve as a launching point for reconnaissance, phishing waves, or a pivot point for a further attack. But wait? What if the exposure is a company webmail that is isolated from the main corporate network? There will be an employee who reuses their password. But what if your company has a policy against that? Then there will definitely be employees who reuse their passwords. Unless your organization uses <a href=\"https:\/\/en.wikipedia.org\/wiki\/Password_manager\" target=\"_blank\">password managers<\/a>,\u00a0a single breached account has a very good chance of being a pivot point for more serious attacks.<\/p>\n<p>Email isn\u2019t the end of sensitive data loss, unfortunately. Stack Overflow, a perennial favorite for developers working out knotty problems, frequently has proprietary code cut and pasted into the site, sometimes with network configuration data attached. Pastebin can and does have network details and code with misconfigured expiration dates, waiting to be scooped up. And LinkedIn is an absolute goldmine for mapping potential accesses to employees. So how do you go about plugging leaks? A three-point strategy can get you started.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16091 size-medium\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/lawyer-298x300.png\" alt=\"lawyer\" width=\"298\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/lawyer-298x300.png 298w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/lawyer-150x150.png 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/lawyer-596x600.png 596w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/lawyer.png 1000w\" sizes=\"auto, (max-width: 298px) 100vw, 298px\" \/><\/p>\n<p><strong>1.<\/strong> <strong>Legal &#8211;<\/strong>\u00a0This is most important for an internal data protection policy because there are some hard limits to what you can and cannot tell employees to post online. Consulting with an attorney can set some appropriate bounds for what sort of mitigations you want to implement. Further, a lawyer well briefed on cyber threats can be a valuable asset in issuing takedowns of offending material.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16065 size-medium\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/stovepipe-300x277.png\" alt=\"stovepipe\" width=\"300\" height=\"277\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/stovepipe-300x277.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/stovepipe-600x553.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/stovepipe.png 872w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>2. Stovepipe breaking &#8211;<\/strong>\u00a0Communicating directly with first line managers to discover how and why data leaves your organization should constitute the bulk of any data loss mitigation plan. With the exception of the lone knucklehead who signs up for an inappropriate site with a company email (you have one of these, I promise) most data loss occurs because businesses use cases do not align to existing security policy, and users are going to find a workaround. Does your default computing environment have tooling sufficient for developers to do their job or are you 2 versions behind industry standards? How does your security team get a piece of malware off an infected host and onto a test machine? What\u2019s the default attachment size on the corporate mail instance? And if you run on a virtualized environment, what\u2019s the default memory allocation and how much hassle does an employee have to suffer to get it raised? These may appear on the surface to be small, too in-the-weeds type questions. They are in fact very predictable preludes to data loss or a full on breach, because in each instance an employee is incentivized to break policy to get their job done. This is fortunately preventable \u2013 talk to your first line management and gather use cases, <strong>before<\/strong> policy gets set.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16096 size-medium\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/puzzle-300x227.png\" alt=\"puzzle\" width=\"300\" height=\"227\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/puzzle-300x227.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/puzzle-600x453.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/puzzle.png 792w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>3. SOC feedback &#8211;<\/strong> Last but also important is to have your security team aware of company data when it lands in public view. This doesn\u2019t have to be onerous or time consuming; simple crawlers with a list of vetted keywords and domains run as a cron job can go a long way towards finding data where it shouldn\u2019t be. Of course the best case scenario is to prevent leaks before they happen, but swift detection and takedowns (remember you spoke to your lawyer?) can mitigate damage.<\/p>\n<p>3<sup>rd<\/sup> party data breaches are happening at an accelerating pace and show no signs of abating. Secondary effects of these breaches tend to spread tendrils of insecurity much further than the individual site in question. Take some time now to talk to managers, your legal department, and your SOC now, and you can make sure that the next breach won&#8217;t be catastrophic for you as well.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/02\/why-do-i-care-about-someone-elses-data-breach\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2017\/02\/why-do-i-care-about-someone-elses-data-breach\/' title='Why do I care about someone else's data breach?'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/12\/photodune-5968483-man-working-with-computer-and-laptop-xxl-1.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>As the size of your organization increases, the probability that an individual employee\u2019s company email is in that breach rises to 1. So how do you go about plugging leaks? A three-point strategy can get you started.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/how-tos\/\" rel=\"category tag\">How-tos<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach\/\" rel=\"tag\">data breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy\/\" rel=\"tag\">privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threat-intel\/\" rel=\"tag\">Threat Intel<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threatintel\/\" rel=\"tag\">threatintel<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2017\/02\/why-do-i-care-about-someone-elses-data-breach\/' title='Why do I care about someone else's data breach?'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,11172,11171,5897,11143,11173],"class_list":["post-6458","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-data-breach","tag-how-tos","tag-privacy","tag-threat-intel","tag-threatintel"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6458"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6458\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6458"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}