Saturday, MasterCard blamed a vendor of ALL credit card providers called CardSystems Solutions, Inc., a third-party processor of payment card data, as the source of loss of 40 million consumers credit card information.
As is pointed out by several newspaper and web articles over the last few weeks, each recapping long lists of financial information data breaches, something's gotta give before we entirely lose trust in financial institutions, data brokers and credit bureaus. How much privacy loss can we take without acting?
These types of data loss were very likely common and have very probably been going on for a very long time. The difference is that now, THEY ARE REQUIRED BY LAW TO DISCLOSE THOSE LOSSES - not just in California, but in many states. National disclosure laws on data security breaches are being considered in Congress.
I suggest that these breaches of data security all came to light due to the California law requiring disclosure from companies suffering hacking loss or leaks or social engineering or crooked employees or organized crime rings posing as "legitimate" customers. All of the above have been given as reasons for security lapses or poor security policies.
About three years ago, a friend told me his paycheck deposit to Bank of America went missing from account records after he took his check to the bank on Friday. By Monday, Bank of America was in the news claiming a computer glitch had disappeared the entire day's deposits. I mumbled to myself, "I'll bet that was a hack and that hacker just made a huge offshore banking deposit with B of A depositors' money."
But we didn't find out why it happened in that particular case because there was no disclosure law in place at the time. Now we have disclosure laws that mandate notice of security breaches. Now suddenly - huge financial services hacks and devious criminal social engineering outfits posing as legitimate customers and apparently "innocent" losses by transport companies of backup tapes begin to come to light.
This spate of data loss incidents is proof of the need for corporate "sunshine laws" that make public notice mandatory of those data losses that threaten customer information.
Who is going to lose here - the public, the corporations, the criminals, or the government? I'd prefer that the bad guys get the shaft and take down crooked company insiders that either facilitate data loss by underfunding security and encryption or participate in data theft or loss in any form - even if that participation is security negligence.
Financial companies and data brokers have been covering up the losses and keeping quiet about hacks so as not to worry or frighten their customers. But that practice is essentially ended now that they must notify the public and disclose those losses instead of hushing them up.
Keeping the breaches hidden from public view is bad practice as it maintains the status quo. Disclosure will facilitate internal corporate lockdowns on the data and all access to it. Disclosure will educate the public to the lack of security and danger to the sensitive information we all provide rather casually and routinely to businesses.
As the following link to a silicon.com story suggests, we cannot take much more of this lack of regard to privacy and must lock down financially sensitive data securely and must begin to hold data brokers, bureaus and handlers VERY accountable.
Insist to your elected representatives that your financial data be locked down, encrypted and guarded by those entrusted with storing, transporting and using it. Since our financial, medical and legal lives are increasingly being housed in digital form and transmitted between data centers of multiple handlers - we need to know it is secure. We also need to know when that security has been breached and our data compromised or lost.
Thieves are becoming more aware of the ease with which they can find and access financial data. Hacking is not the source of the greatest losses.
Organized crime has easily found their way into our financial records by simply paying for it by posing as "legitimate" business customers of information brokers such as ChoicePoint and Lexis/Nexis. Any business can buy financial and credit information from those information bureaus and credit reporting agencies by meeting rather lax requirements for "need to know" that data.
As long as it is possible to purchase our sensitive data from brokers and bureaus, organized crime will "legitimately" buy it from those sources, then ruin our credit by selling that information at a higher price in identity theft schemes.
Since disclosure laws have come into effect, those breaches have been made public, credit cards cancelled before losses can occur and credit reports monitored to watch for suspicious activity. The bad guys activities are squelched because we are made aware of the possibility our information has been compromised.
Not all blame can go to financial institutions and data brokers. Protect your own private data by protecting your computer records at home, in the office, on your laptop and in your PDA by using basic keyword security and locking down files. Use built in encryption on your operating system and your home network to keep data secure. Then be certain to clear that sensitive data off the computer when you sell it or throw it away.
Data security is something we all need to take seriously and the corporate breaches are dramatic illustrations of how important it has become to build digital fortresses around our critical financial, legal and medical information.
Mike Banks Valentine is a privacy advocate and blogs about privacy issues at PrivacyNotes.com You can read more about identity theft issues at: Publish101
Contact MikeValentine for Search Engine Optimization http://www.seoptimism.com
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
The Threat10 years ago you could probably have run no... Read More
History and BackgroundThe virus was one of the first ever... Read More
Well, this is an article I never thought I would... Read More
Every now and then you can read about a new... Read More
If you know what is the 'Fishing' then it's very... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
As soon as almost all computer users already got used... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Someone recently told me, "You would have to be a... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Security leaks can be a big problem for any site... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
There you are busily typing away on your PC or... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Millions of people make purchases online, but many people are... Read More
Shopping for horse gifts or other gift items on the... Read More
They're out there. Individuals trying to make a quick buck... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Working from home has its advantages, including no commute, a... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
The first thing people think about when defending their computers... Read More
In 1997, I decided after 15 years as a practicing... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
This is the second in a series of articles highlighting... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Well, this is an article I never thought I would... Read More
Be careful of sites that promise to send you "instant... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Ok, you've got a computer, and you get online. You... Read More
In 1997, I decided after 15 years as a practicing... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
It has been said that with the wealth of information,... Read More
Identity theft is one of the most common criminal acts... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
First off I should explain what phishing is. Phishing is... Read More
In a word, no - an email message has always... Read More
Have you ever got an email asking you to confirm... Read More
The most frustrating part of having Spyware on your computer... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
To blog or not to blog? Well, why not? Lots... Read More
While clicking from site to site on the internet you... Read More
With the advent of the World Wide Web, a whole... Read More
You are at your computer, checking out software on EBay.... Read More
P C. owners are constantly at risk from attacks by... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Only the top spyware removers are successful at detecting and... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
A friend called me one day and asked if I... Read More
Well, if that would have been said to me by... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Threats we ordinary Web users face online leave us no... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
As you know, this time the virus under the name... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
When it comes to reporting Internet scams most of us... Read More
Internet Security |