Tuesday, March 25, 2014

Attorney General Harris Unveils Cybersecurity Guide for California Businesses

The California Attorney General’s Office has announced the release of a new cybersecurity guide designed to help California businesses better protect against and respond to cybersecurity threats.  The guide provides a simple and easy to understand overview of basic security threats and outlines some practical steps for minimizing cyber vulnerabilities, including guidance on how to respond to cyber incidents.
“California is at the center of the digital revolution that is changing the world. Because of work done by companies right here in our home state, we are more connected – and empowered – than ever before” said Attorney General Kamala D. Harris.  “But we are also increasingly vulnerable, a fact underscored by the recent holiday–period data breaches that impacted millions across the country.”
California has long been at forefront of cyber security advocacy and was the first state to pass a law mandating data breach notification.  In 2011, California established the eCrime Unit to prosecute identity theft, data intrusions, and crimes involving the use of technology.  In 2012, California established the Privacy Enforcement and Protection Unit in the Department of Justice, whose mission is to help to regulate and enforce laws addressing the collection, retention, disclosure, and destruction of private or sensitive information.  Continuing that tradition, Attorney General Harris, in collaboration with the California Chamber of Commerce and a mobile security company called Lookout, developed the guide titled, “Cybersecurity in the Golden State” (the “Guide”).
The purpose of the Guide is to specify ways that small and medium-size businesses can reduce cybersecurity risks.  To accommodate individuals who may not be tech-savvy, the Guide uses plain language to describe steps that any business can take to help protect itself, even if it lacks the resources to hire full-time cybersecurity personnel.
Key recommendations include:
  • Assume you’re a target and develop an incident response plan now;
  • Map your data and review where your business stores or shares information with third parties including backup storage and cloud computing;
  • Encrypt the data you need to keep. Strong encryption technology is now commonly available for free, and is generally easy to use;
  • Educate employees about cyber threats, as they are often the first line of defense;
  • Follow safe online practices such as regularly updating firewall and antivirus software on all devices, using strong passwords, and avoiding downloading software from unknown sources;
  • Pick an incident

The issue of cyber security is increasingly important as the recent security breaches at Target and Niemen Marcus help to demonstrate.  According to data cited by the Attorney General’s Office, there were more than one billion cyberattacks in the first three months of 2013, a number that is likely to keep growing as hackers become more sophisticated and organized.  While the  recommendations contained in the Guide are not legally mandated, they do reflect security best practices that, if followed, have the potential to help mitigate the risk of cybersecurity attacks.
https://oag.ca.gov/cybersecurity 

Wednesday, February 19, 2014

2013 Data Breach Trends

2013 Data Breach at a Glance


  1. There were 2,164 incidents reported through December 31, 2013 exposing 822 million records.
  2. A single hacking incident involving Adobe Systems exposed 
  3. The Business sector accounted for 53.4% of reported incidents, followed by Government (19.3%), Medical (11.5%), Education (8.2%), and Unknown (7.6%). 
  4. The Business sector accounted for 73.9% of the number of records exposed, followed by Unknown at 24.5%. 
  5. 59.8% of reported incidents were the result of Hacking which accounted for 72.0% of exposed records. 
  6. 4.8% of the reported incidents were the result of Web related attacks which accounted 16.9% of exposed records. 
  7. Breaches involving U.S. entities accounted for 48.7% of the incidents and 66.5% of the exposed records. 
  8. 51.1% of the incidents exposed between one and 1000 records. 
  9. Twenty-seven incidents have exposed more than one million records. 
  10. Four 2013 incidents have secured a place on the Top 10 All Time Breach List. 
  11. The number of reported exposed records tops 2.5 billion and the number of reported incidents tracked by Risk Based Security exceeded 11,200.
  12. A review of all reported incidents shows a total of 31.3% of all incidents are attributable to insider activity vs. 2013’s 25.0%.

Friday, November 16, 2012

Más respuestas a la protección de datos

Les comparto un a columna que escribí en Abril de este año sobre protección de datos personales. En relación a las acciones para la seguridad de los datos personales Artículo 61. A fin de establecer y mantener la seguridad de los datos personales, el responsable deberá considerar las siguientes acciones: I. Elaborar un inventario de datos personales y de los sistemas de tratamiento; II. Determinar las funciones y obligaciones de las personas que traten datos personales; III. Contar con un análisis de riesgos de datos personales que consiste en identificar peligros y estimar los riesgos a los datos personales; IV. Establecer las medidas de seguridad aplicables a los datos personales e identificar aquéllas implementadas de manera efectiva; V. Realizar el análisis de brecha que consiste en la diferencia de las medidas de seguridad existentes y aquéllas faltantes que resultan necesarias para la protección de los datos personales; VI. Elaborar un plan de trabajo para la implementación de las medidas de seguridad faltantes, derivadas del análisis de brecha; VII. Llevar a cabo revisiones o auditorías; VIII. Capacitar al personal que efectúe el tratamiento, y IX. Realizar un registro de los medios de almacenamiento de los datos personales. El responsable deberá contar con una relación de las medidas de seguridad derivadas de las fracciones anteriores.