DiscoverBeneficial IntelligenceAccidental Publication
Accidental Publication

Accidental Publication

Update: 2021-04-30
Share

Description

In this episode of Beneficial Intelligence, I discuss accidental publication. There are two ways organizations lose data: Through break-ins and through carelessness.  It is hard to protect your systems against determined hackers, but it should not be hard to protect yourself against carelessness. Strangely, this is just as big a source of data leaks as determined hacker attacks. 

Some accidental losses are the result of individual failures to follow procedures. The British MI6 is famous for losing classified laptops in taxis and having them stolen from unattended cars. In Denmark, the health authorities produced two unencrypted CD-ROMs with data on every Danish citizen and their illnesses. They were accidentally sent to the Chinese embassy instead of the national statistics authority. 

Other losses happen because organizations are accidentally publishing data to the entire world. By now, every tech journalist who sees a ?id=48375 in a web address will try to change the number to something else. That's how the State of California accidentally published information about all donations Californians made to NGOs and political organizations. 

Another way is through badly secured APIs. A 19-year old college student shopping for student loans found he could check whether he qualified for a loan by simply entering his name, address, and date of birth. Looking at the web page source, he quickly discovered that the website was calling an unsecured API at credit scoring company Experian. 

As a CIO or CTO, you can no longer allow the security strategy of your IT organization to depend on a lack of IT skills in the general public. Are you sure every system your organization rolls out has been subject to a security review? If not, you might be the next organization to find that you have accidentally published confidential data.

Beneficial Intelligence is a weekly podcast with stories and pragmatic advice for CIOs, CTOs, and other IT leaders. To get in touch, please contact me at
sten@vesterli.com

Comments 
In Channel
People Shortage

People Shortage

2021-11-2605:43

Data Hoarding

Data Hoarding

2021-10-2907:29

Monoculture

Monoculture

2021-10-1509:04

Trust, but Verify

Trust, but Verify

2021-10-0109:34

Time to Recover

Time to Recover

2021-09-1708:28

Goal Fixation

Goal Fixation

2021-09-0309:10

Narrow Focus

Narrow Focus

2021-08-2008:28

Back to the Office

Back to the Office

2021-08-0608:38

Humans and Computers

Humans and Computers

2021-07-2306:42

Competition

Competition

2021-07-0910:18

Pseudo-Security

Pseudo-Security

2021-06-2507:53

Good Enough

Good Enough

2021-06-1807:55

Unnecessary Roadblocks

Unnecessary Roadblocks

2021-06-0409:08

Expectation Management

Expectation Management

2021-05-2807:50

Gaming the Metrics

Gaming the Metrics

2021-05-0710:31

Accidental Publication

Accidental Publication

2021-04-3007:55

Irrational Optimism

Irrational Optimism

2021-04-2308:05

Risk Aversion

Risk Aversion

2021-04-1605:23

Biased Data

Biased Data

2021-04-0907:29

loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Accidental Publication

Accidental Publication

Sten Vesterli