The theft of approximately 3.6 million Social Security numbers and information on 387,000 credit and debit card accounts from government systems of the US state of South Carolina is yet another reminder that all IT operations should lock down their sensitive data by segmenting their networks, using better access controls, and regularly performing vulnerability assessments, security experts said.
On 26 October, the South Carolina Department of Revenue announced that attackers had breached its systems in September, following two previous attacks in August. The attacks exploited an unspecified vulnerability in the system, which the state agency closed on 20 October.
The online thieves who breached its network took a large amount of sensitive information on any taxpayers that had filed tax returns since 1998.
Millions of sensitive records have been taken from US government systems in recent months. In April, a hacker used a weak password to break into a server managed by the Utah Department of Technology Services and steal Social Security numbers and medical information on 780,000 people. In 2011, systems at Massachusetts’ Department of Unemployment Assistance and Department of Career Services were infected with a malicious program that may have taken sensitive data on 210,000 job seekers.
“If you think about it, a lot of our information is held by state and local governments,” said Anup Ghosh, chief executive of security firm Invincea. “Traditionally, they have lagged, but if you look at the data that they have, they really can’t afford to be behind.”
Private corporations have not done much better. In 2012, data-breach incidents have hit an all-time high, nearing 1,200 incidents, according to the Data Loss Database, an organisation that tracks publicly available information on a variety of breaches, from hacks to lost hard drives.
Companies as well as government agencies need to better limit access to data and ensure that any sensitive information is encrypted while stored. By segmenting networks to restrict access to only necessary personnel as well as cordon off malware from using an insider’s machine to steal information, companies and government agencies can be more certain that they are not leaking information. Finally, regular vulnerability scans can help find and close potential backdoors that could lead to a breach, as in the South Carolina case.
“Cases like this continue to raise awareness of the shortcomings of traditional infrastructure security in keeping sensitive data safe,” Mark Bower, vice president at data-protection provider Voltage Security, said in a statement on the Department of Revenue breach. “If data is not protected, it’s going to be breached at some point. And if an organisation can’t protect data wherever it goes, the data shouldn’t be on vulnerable systems that can put thousands of people’s identities at risk if compromised, lost or stolen.”
What do you know about Windows? Take our quiz.
Originally published on eWeek.
US widening lead over China on AI development, as UK places third in Stanford index…
Amazon to invest a further $4bn into AI start-up Anthropic, doubling its investment as it…
The demand for tech skills is surging, driving economic growth but revealing challenges. Financial costs,…
US Supreme Court tosses Meta's appeal over Cambridge Analytica-linked investor lawsuit, meaning case must proceed
Uber reportedly seeks $10m stake in Chinese autonomous driving firm Pony AI via US IPO,…
iPhone maker reportedly developing next-generation AI large language model for Siri for spring 2026 as…
View Comments
Governments, and especially small governments such as local councils are increasingly at risk of being hacked. The culture of prevention is just not in there yet despite all this issues. It's far cheaper to establish security measures (not only firewalls but security strategies and culture) than trying to repair damages.