SlideShare a Scribd company logo
White Paper: Managed Security




Managed Security for
a Not-So-Secure World
CIOs need a strategy for a secure enterprise in
today’s insecure world.

                                It turns out that the infamous TJX Companies breach
                                in January 2007 was only the tip of the iceberg: there has been an
                                explosion of data security incidents in the past few years. In 2008,
                                the Identity Theft Resource Center (ITRC) reported 656 breaches, a 47
                                percent increase over 2007. And there have been 213 data breaches
                                in the first five months of this year alone.

                                This risky data environment is colliding with an IT landscape of
                                shrinking resources. An April 2009 Lieberman Software survey of IT
                                professionals discovered that 60 percent of respondents work at
                                organizations that have cut their IT budgets, and 40 percent of organi-
                                zations have reduced their IT teams. Such cuts leave fewer resources
                                available to handle the ongoing need for compliance with a bevy of
                                regulations—from the Sarbanes-Oxley Act (SOX) to the Health Insur-
                                ance Portability and Accountability Act (HIPAA) to the Payment Card

                                                                                         WP090991 8/09
Qwest White Paper: Managed Security




Industry Data Security Standard (PCI DSS)—to whatever
new transparency requirements will arise from the                         For more information about
banking crisis.
                                                                          Qwest’s managed security
But business must go on. CIOs must manage security
risks while addressing business needs and focusing                        services, visit us at
on revenue-generating activities. This paper offers a                     www.qwest.com/business
strategy for providing data security and protection that
addresses the rising data threat landscape, the need for
compliance, and today’s lean IT staffs.


Good Enough Isn’t                                                     Being Compliant
Always Enough                                                         Some of these regulations, or parts of them, promote
Unlike conventional projects with a beginning, middle                 data protection within particular industries. For ex-
and an end, IT security is never finished. The security               ample, the Gramm-Leach-Bliley Act (GLBA) has privacy
program implemented yesterday may not be adequate                     stipulations to protect information in the financial ser-
tomorrow because new threats arise every day.                         vices industry, including companies providing financial
                                                                      products and services to consumers. For example, the
Opportunistic predators, for example, exist both inside
                                                                      GLBA’s Financial Privacy Rule requires financial institu-
and outside the organization. Organized crime is a ma-
                                                                      tions to give their customers privacy notices that ex-
jor concern from a financial perspective because their
                                                                      plain the institution’s information collection and sharing
motivation is typically financial gain, which causes them
                                                                      practices. In addition, customers have the right to limit
to continually seek out potential network infrastructure
                                                                      the sharing of their information.
vulnerabilities, and create new viruses and worms. This
has significantly raised the quality of threats that com-             Failure to comply with these regulations can lead to stiff
panies must defend themselves against.                                penalties—HIPAA fines, for example, can be as high as
                                                                      $50,000 per violation. And the American Recovery and
Though most IT managers are vigilant and diligent in us-
                                                                      Reinvestment Act of 2009 will further tighten HIPAA’s
ing the tools they have to protect corporate data, there
                                                                      privacy and security rules for data breach notification,
are often blind spots that these predators will find and
                                                                      enforcement, audit trails and encryption. Then there’s
exploit. Ensuring corporate data is safe takes consider-
                                                                      the PCI DSS, which governs payment card transactions.
able proactive, continual monitoring—or outside help.
                                                                      Here again, noncompliance can be expensive: for ex-
“Keeping up with the high traffic in vulnerability disclo-            ample, Visa could fine transaction processors between
sures is a perennial challenge and an important part of               $5,000 and $25,000 a month if the merchants or retail-
our program since we focus on proactively identifying                 ers they represent are not PCI compliant.
and remediating risks,” says Michael Glenn, director of
                                                                      What’s troublesome is that companies often think
information security and chief information security official
                                                                      they’re in compliance but end up finding out the hard
(CISO) at Qwest Communications International Inc., a
                                                                      way that they’re not. Take the examples of RBS World-
managed security provider. “We have to balance our re-
                                                                      Pay and Heartland Payment Systems, which process
sources between our proactive, innovative programs and
                                                                      credit card payments. Before the end of 2008, they were
our reactive obligations, including a growing list of compli-
                                                                      believed to be PCI compliant. However, hackers tapped
ance auditing, certification and reporting activities.”
                                                                      into their data, including cardholders’ private informa-
Those compliance issues can be burdensome. Mandat-                    tion. The point is that just checking a checkbox for
ed compliance with a wide and growing variety of state,               compliance may not protect your organization’s data;
federal and industry regulations places an increasing                 you must have solid security practices in place to first
strain on IT staff.                                                   protect data, and then meet compliance obligations.


                                                                [2]                                               WP090991 8/09
Qwest White Paper: Managed Security




There are intangible costs as well. A breach in security of
this magnitude causes a lack of confidence among cur-                  Benefits of an
rent and prospective customers. CIOs and IT managers                   Outsourcing Partner
recognize this threat. In a recent survey conducted by
IDG Research Services on behalf of Fiberlink Communi-
                                                                       r   Staff: Professionally trained talent to
                                                                           manage and implement security programs
cations, 81 percent of respondents said that damage to
                                                                           and plans
their company’s reputation from a data breach was their
greatest concern, followed by legal consequences and                   r   SOlutIOnS: Carefully researched and
costs (79 percent) and loss of critical data (74 percent).                 selected security technologies
Things like proactive network monitoring, testing and                  r   COSt: Lower total cost of ownership for
tracking, complex firewall configuration, a comprehen-                     labor and technology through scaling,
sive vulnerability management program, centralized                         configuration, maintenance of technology
logging and auditing, an access control program, and                       solutions, training personnel, and research-
sound, comprehensive security policies are necessary                       ing processes and products
for a good security program and to meet compliance
                                                                       r   KnOwledge: Experience and knowledge
obligations. Considerable staff and resources are also
                                                                           base to discover vulnerabilities, face new
required.
                                                                           security threats and solve complex security
So, how does the CIO face these challenges?                                problems



Outsourcing Managed Security
Given the security risk climate and the reduction in IT             for a fully dedicated security staff or ongoing training. In
staffs, working with an IT and security service provider            addition, expert security professionals, especially those
is more practical. With the appropriate foundation of               with credentials from professional associations, are in
outsourced services, security becomes manageable                    high demand, so retaining them can be difficult.
and reliable.
                                                                    On the flipside, a well-recognized, comprehensive
Of course, cost is a consideration. You should conduct              security service provider has already gone through the
a thorough analysis of the time and expenses involved               rigors of recruiting and training quality security person-
in using internal resources and then weigh it against               nel. In addition, these teams have been exposed to a
an outsourcing provider’s cost model. For example, the              variety of enterprise security challenges from a diverse
cost of managing and configuring technology is a key                clientele. Tapping into this expertise offers not only a
component of the total cost of a security program. And              skilled security strategy, but also a fresh look at how to
you have to consider whether your in-house expertise is             address risks.
up to the task.
                                                                    Another consideration is that IT and business processes
“Inevitably, difficult economic times can cause other-              are often in flux, due to changing market conditions
wise good people to make poor decisions,” says Glenn.               and business demands. Managing them requires both
“I expect to see a continued need for vigilance against             time and broad experience; organizations with tight IT
malicious software and attacks like spear phishing that             budgets can suffer process management constraints. An
are rooted in fraud, along with the ever-present insider            outsourcing partner can add value by bringing a wide
threat. In a downturned economy, you do not want to be              range of expertise and the ability to look at the entire
significantly cutting your information security program.”           scope of a company’s processes to identify potential
                                                                    obstacles or problem areas.
To stay abreast of vulnerabilities and threats, IT person-
nel must continually expand their knowledge and exper-              Employing the best people and processes are only
tise, which can be challenging if budgets do not allow              parts of the equation. You also need the right tech-

                                                              [3]                                                WP090991 8/09
Qwest White Paper: Managed Security




nology. Because new security tools and solutions               term business goals. Using managed services to address
are introduced every day, evaluating, purchasing and           security risks is a best practice to reduce costs, ensure
maintaining them requires time and an understanding            compliance and allow IT staff to focus on critical busi-
of how they will best fit the organization. A feasible         ness operations.
alternative is to lean on a managed security provider
                                                               Glenn offers this closing advice: “Spend just as much,
that has experience with a wide variety of solutions,
                                                               and preferably more of your energy on building rela-
and that can provide a thorough analysis of which
                                                               tionships with key stakeholders across your enterprise
tools are most appropriate.
                                                               than you spend learning the bits and bytes of the latest
                                                               technical toy. If you have the right relationships with
                                                               your business, you can always find a means to accom-
Conclusion                                                     plish your objectives by making your business success-
In the IT landscape, vulnerabilities and threats arise         ful through good security practices and risk manage-
constantly while new and shifting compliance regula-           ment. Learning those technical means together gives
tions place increased pressure on data protection. And         you more credibility.”
CIOs must face these issues with reduced staff and
                                                               Take an honest look at your internal capabilities, and
contracted budgets.
                                                               compare them to what a managed security services
A solid relationship with a managed service provider           provider can offer, including economies of scale. It’s
can be of great help, freeing CIOs to focus on core            likely that a security strategy that includes outsourcing
business operations, build better relationships with           in its mix will be a cost-effective, practical and winning
stakeholders and ultimately achieve short and long-            solution.




   failing to Comply
   Data breaches have resulted in disciplinary actions and fines by the Federal Trade Commission
   (FTC) in numerous cases. Here are a few examples:

   r   The FTC disciplined a Texas-based mortgage company after it failed to provide reasonable security to
       protect sensitive customer data. Third-party home sellers were able to access private data without
       security measures in place. A hacker compromised the data by breaking into a home seller’s computer,
       obtaining the lender’s credentials and using them to access hundreds of consumer reports. Because
       this mortgage company had inadequate data protection, they were liable for the security breach.

   r   When hackers stole the personal data of some 46 million customers of retail conglomerate TJX Compa-
       nies, the FTC attributed the breach to a failure by TJX to use reasonable and appropriate security mea-
       sures on its networks. As a result, a third party must audit the company every other year for 20 years
       and TJX must show improvement in its network security, service provider selection and how it handles
       consumer information. The retailer also negotiated a settlement reported at more than $40 million with
       Visa International.

   r   After it was discovered that hackers had accessed the sensitive information of hundreds of consum-
       ers, an online seller of computer supplies was admonished by the FTC. The company failed to provide
       reasonable security to protect sensitive customer data such as personal information and credit card
       numbers. The vendor suffered bad publicity and diminished overall customer confidence.

       SOURCE: www.ftc.gov




                                                         [4]                                              WP090991 8/09

More Related Content

PPTX
Data Security and Regulatory Compliance
PDF
Sept 2012 data security & cyber liability
PDF
Under Lock And Key
PDF
In the news
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PDF
clearswift-adaptive-redaction-brochure
PPT
Improving cyber-security through acquisition
PDF
Cybersecurity and The Board
Data Security and Regulatory Compliance
Sept 2012 data security & cyber liability
Under Lock And Key
In the news
Protecting the Crown Jewels – Enlist the Beefeaters
clearswift-adaptive-redaction-brochure
Improving cyber-security through acquisition
Cybersecurity and The Board

What's hot (18)

PDF
Cover and CyberSecurity Essay
PPT
Cyber Insurance Temp
PDF
SecureGRC: Unification of Security Monitoring and IT-GRC
PDF
Secure dataroom whitepaper_protecting_confidential_documents
PDF
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
PDF
Enterprise cyber security
PPTX
Cybersecurity & the Board of Directors
PPT
Shaping Your Future in Banking Cybersecurity
PDF
br-security-connected-top-5-trends
PPTX
Ci2 cyber insurance presentation
PDF
1 s2.0-s0167404801002097-main
PDF
July 2010 Cover Story
PDF
Looking Forward - Regulators and Data Incidents
PDF
Mapping Application Security to Business Value - Redspin Information Security
PDF
White paper cyber risk appetite defining and understanding risk in the moder...
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PDF
Finding a Strategic Voice - IBM CISO Study
PDF
Information Security Governance: Government Considerations for the Cloud Comp...
Cover and CyberSecurity Essay
Cyber Insurance Temp
SecureGRC: Unification of Security Monitoring and IT-GRC
Secure dataroom whitepaper_protecting_confidential_documents
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
Enterprise cyber security
Cybersecurity & the Board of Directors
Shaping Your Future in Banking Cybersecurity
br-security-connected-top-5-trends
Ci2 cyber insurance presentation
1 s2.0-s0167404801002097-main
July 2010 Cover Story
Looking Forward - Regulators and Data Incidents
Mapping Application Security to Business Value - Redspin Information Security
White paper cyber risk appetite defining and understanding risk in the moder...
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Finding a Strategic Voice - IBM CISO Study
Information Security Governance: Government Considerations for the Cloud Comp...
Ad

Similar to Managed Security For A Not So Secure World Wp090991 (20)

PDF
managed-security-for-a-not-so-secure-world-wp090991
PDF
3 guiding priciples to improve data security
PDF
I Series User Management
PDF
Information Security It's All About Compliance
PDF
Security Feature Cover Story
PPTX
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
PPT
Powerpoint mack jackson
PDF
The Business Case for Data Security
PPTX
ISACA New York Metro April 30 2012
PPTX
2013 PMA Business Security Insights
PPTX
Ulf mattsson webinar jun 7 2012 slideshare version
PDF
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
PDF
Data Safety And Security
PDF
Security For Free
PPTX
Moving to the Cloud: A Security and Hosting Introduction
PDF
Data security in cloud
PDF
Getting Real About Security Management and “Big Data”
 
PPT
Guardium value proposition for fss pn 12 02-10
PDF
2006 issa journal-organizingand-managingforsuccess
PDF
The Big Picture: Beyond Compliance To Risk Management
managed-security-for-a-not-so-secure-world-wp090991
3 guiding priciples to improve data security
I Series User Management
Information Security It's All About Compliance
Security Feature Cover Story
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Powerpoint mack jackson
The Business Case for Data Security
ISACA New York Metro April 30 2012
2013 PMA Business Security Insights
Ulf mattsson webinar jun 7 2012 slideshare version
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
Data Safety And Security
Security For Free
Moving to the Cloud: A Security and Hosting Introduction
Data security in cloud
Getting Real About Security Management and “Big Data”
 
Guardium value proposition for fss pn 12 02-10
2006 issa journal-organizingand-managingforsuccess
The Big Picture: Beyond Compliance To Risk Management
Ad

More from Erik Ginalick (20)

PDF
Unleashing The Power Of Customer Data Wp091047
PDF
Understand Benefits Of Electronic Health Records Wp091005
PDF
Reaching For The Cloud Wp101366
PDF
Qmoe For Manufacturing Wp090862
PDF
Qmoe For Public Sector Wp090863
PDF
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
PDF
The Worry Free Network Wp091050
PDF
Qmoe For Financial Services Wp090860
PDF
Qmoe For Healthcare Wp090861
PDF
Protecting Payment Card Data Wp091010
PDF
Planning For Disaster And Everyday Threats Wp111438
PDF
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
PDF
Plan For Success White Paper
PDF
Optimizing Your Communications In A Recession Wp090993
PDF
Is Cloud Computing Right For You Wp101305
PDF
Ipv Technical White Paper Wp111504
PDF
Ipv6 Technical White Paper Wp111504
PDF
Infrastructures For Innovation Wp090974
PDF
Healthcare It Security Necessity Wp101118
PDF
Five Network Security Threats And How To Protect Your Business Wp101112
Unleashing The Power Of Customer Data Wp091047
Understand Benefits Of Electronic Health Records Wp091005
Reaching For The Cloud Wp101366
Qmoe For Manufacturing Wp090862
Qmoe For Public Sector Wp090863
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
The Worry Free Network Wp091050
Qmoe For Financial Services Wp090860
Qmoe For Healthcare Wp090861
Protecting Payment Card Data Wp091010
Planning For Disaster And Everyday Threats Wp111438
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Plan For Success White Paper
Optimizing Your Communications In A Recession Wp090993
Is Cloud Computing Right For You Wp101305
Ipv Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
Infrastructures For Innovation Wp090974
Healthcare It Security Necessity Wp101118
Five Network Security Threats And How To Protect Your Business Wp101112

Managed Security For A Not So Secure World Wp090991

  • 1. White Paper: Managed Security Managed Security for a Not-So-Secure World CIOs need a strategy for a secure enterprise in today’s insecure world. It turns out that the infamous TJX Companies breach in January 2007 was only the tip of the iceberg: there has been an explosion of data security incidents in the past few years. In 2008, the Identity Theft Resource Center (ITRC) reported 656 breaches, a 47 percent increase over 2007. And there have been 213 data breaches in the first five months of this year alone. This risky data environment is colliding with an IT landscape of shrinking resources. An April 2009 Lieberman Software survey of IT professionals discovered that 60 percent of respondents work at organizations that have cut their IT budgets, and 40 percent of organi- zations have reduced their IT teams. Such cuts leave fewer resources available to handle the ongoing need for compliance with a bevy of regulations—from the Sarbanes-Oxley Act (SOX) to the Health Insur- ance Portability and Accountability Act (HIPAA) to the Payment Card WP090991 8/09
  • 2. Qwest White Paper: Managed Security Industry Data Security Standard (PCI DSS)—to whatever new transparency requirements will arise from the For more information about banking crisis. Qwest’s managed security But business must go on. CIOs must manage security risks while addressing business needs and focusing services, visit us at on revenue-generating activities. This paper offers a www.qwest.com/business strategy for providing data security and protection that addresses the rising data threat landscape, the need for compliance, and today’s lean IT staffs. Good Enough Isn’t Being Compliant Always Enough Some of these regulations, or parts of them, promote Unlike conventional projects with a beginning, middle data protection within particular industries. For ex- and an end, IT security is never finished. The security ample, the Gramm-Leach-Bliley Act (GLBA) has privacy program implemented yesterday may not be adequate stipulations to protect information in the financial ser- tomorrow because new threats arise every day. vices industry, including companies providing financial products and services to consumers. For example, the Opportunistic predators, for example, exist both inside GLBA’s Financial Privacy Rule requires financial institu- and outside the organization. Organized crime is a ma- tions to give their customers privacy notices that ex- jor concern from a financial perspective because their plain the institution’s information collection and sharing motivation is typically financial gain, which causes them practices. In addition, customers have the right to limit to continually seek out potential network infrastructure the sharing of their information. vulnerabilities, and create new viruses and worms. This has significantly raised the quality of threats that com- Failure to comply with these regulations can lead to stiff panies must defend themselves against. penalties—HIPAA fines, for example, can be as high as $50,000 per violation. And the American Recovery and Though most IT managers are vigilant and diligent in us- Reinvestment Act of 2009 will further tighten HIPAA’s ing the tools they have to protect corporate data, there privacy and security rules for data breach notification, are often blind spots that these predators will find and enforcement, audit trails and encryption. Then there’s exploit. Ensuring corporate data is safe takes consider- the PCI DSS, which governs payment card transactions. able proactive, continual monitoring—or outside help. Here again, noncompliance can be expensive: for ex- “Keeping up with the high traffic in vulnerability disclo- ample, Visa could fine transaction processors between sures is a perennial challenge and an important part of $5,000 and $25,000 a month if the merchants or retail- our program since we focus on proactively identifying ers they represent are not PCI compliant. and remediating risks,” says Michael Glenn, director of What’s troublesome is that companies often think information security and chief information security official they’re in compliance but end up finding out the hard (CISO) at Qwest Communications International Inc., a way that they’re not. Take the examples of RBS World- managed security provider. “We have to balance our re- Pay and Heartland Payment Systems, which process sources between our proactive, innovative programs and credit card payments. Before the end of 2008, they were our reactive obligations, including a growing list of compli- believed to be PCI compliant. However, hackers tapped ance auditing, certification and reporting activities.” into their data, including cardholders’ private informa- Those compliance issues can be burdensome. Mandat- tion. The point is that just checking a checkbox for ed compliance with a wide and growing variety of state, compliance may not protect your organization’s data; federal and industry regulations places an increasing you must have solid security practices in place to first strain on IT staff. protect data, and then meet compliance obligations. [2] WP090991 8/09
  • 3. Qwest White Paper: Managed Security There are intangible costs as well. A breach in security of this magnitude causes a lack of confidence among cur- Benefits of an rent and prospective customers. CIOs and IT managers Outsourcing Partner recognize this threat. In a recent survey conducted by IDG Research Services on behalf of Fiberlink Communi- r Staff: Professionally trained talent to manage and implement security programs cations, 81 percent of respondents said that damage to and plans their company’s reputation from a data breach was their greatest concern, followed by legal consequences and r SOlutIOnS: Carefully researched and costs (79 percent) and loss of critical data (74 percent). selected security technologies Things like proactive network monitoring, testing and r COSt: Lower total cost of ownership for tracking, complex firewall configuration, a comprehen- labor and technology through scaling, sive vulnerability management program, centralized configuration, maintenance of technology logging and auditing, an access control program, and solutions, training personnel, and research- sound, comprehensive security policies are necessary ing processes and products for a good security program and to meet compliance r KnOwledge: Experience and knowledge obligations. Considerable staff and resources are also base to discover vulnerabilities, face new required. security threats and solve complex security So, how does the CIO face these challenges? problems Outsourcing Managed Security Given the security risk climate and the reduction in IT for a fully dedicated security staff or ongoing training. In staffs, working with an IT and security service provider addition, expert security professionals, especially those is more practical. With the appropriate foundation of with credentials from professional associations, are in outsourced services, security becomes manageable high demand, so retaining them can be difficult. and reliable. On the flipside, a well-recognized, comprehensive Of course, cost is a consideration. You should conduct security service provider has already gone through the a thorough analysis of the time and expenses involved rigors of recruiting and training quality security person- in using internal resources and then weigh it against nel. In addition, these teams have been exposed to a an outsourcing provider’s cost model. For example, the variety of enterprise security challenges from a diverse cost of managing and configuring technology is a key clientele. Tapping into this expertise offers not only a component of the total cost of a security program. And skilled security strategy, but also a fresh look at how to you have to consider whether your in-house expertise is address risks. up to the task. Another consideration is that IT and business processes “Inevitably, difficult economic times can cause other- are often in flux, due to changing market conditions wise good people to make poor decisions,” says Glenn. and business demands. Managing them requires both “I expect to see a continued need for vigilance against time and broad experience; organizations with tight IT malicious software and attacks like spear phishing that budgets can suffer process management constraints. An are rooted in fraud, along with the ever-present insider outsourcing partner can add value by bringing a wide threat. In a downturned economy, you do not want to be range of expertise and the ability to look at the entire significantly cutting your information security program.” scope of a company’s processes to identify potential obstacles or problem areas. To stay abreast of vulnerabilities and threats, IT person- nel must continually expand their knowledge and exper- Employing the best people and processes are only tise, which can be challenging if budgets do not allow parts of the equation. You also need the right tech- [3] WP090991 8/09
  • 4. Qwest White Paper: Managed Security nology. Because new security tools and solutions term business goals. Using managed services to address are introduced every day, evaluating, purchasing and security risks is a best practice to reduce costs, ensure maintaining them requires time and an understanding compliance and allow IT staff to focus on critical busi- of how they will best fit the organization. A feasible ness operations. alternative is to lean on a managed security provider Glenn offers this closing advice: “Spend just as much, that has experience with a wide variety of solutions, and preferably more of your energy on building rela- and that can provide a thorough analysis of which tionships with key stakeholders across your enterprise tools are most appropriate. than you spend learning the bits and bytes of the latest technical toy. If you have the right relationships with your business, you can always find a means to accom- Conclusion plish your objectives by making your business success- In the IT landscape, vulnerabilities and threats arise ful through good security practices and risk manage- constantly while new and shifting compliance regula- ment. Learning those technical means together gives tions place increased pressure on data protection. And you more credibility.” CIOs must face these issues with reduced staff and Take an honest look at your internal capabilities, and contracted budgets. compare them to what a managed security services A solid relationship with a managed service provider provider can offer, including economies of scale. It’s can be of great help, freeing CIOs to focus on core likely that a security strategy that includes outsourcing business operations, build better relationships with in its mix will be a cost-effective, practical and winning stakeholders and ultimately achieve short and long- solution. failing to Comply Data breaches have resulted in disciplinary actions and fines by the Federal Trade Commission (FTC) in numerous cases. Here are a few examples: r The FTC disciplined a Texas-based mortgage company after it failed to provide reasonable security to protect sensitive customer data. Third-party home sellers were able to access private data without security measures in place. A hacker compromised the data by breaking into a home seller’s computer, obtaining the lender’s credentials and using them to access hundreds of consumer reports. Because this mortgage company had inadequate data protection, they were liable for the security breach. r When hackers stole the personal data of some 46 million customers of retail conglomerate TJX Compa- nies, the FTC attributed the breach to a failure by TJX to use reasonable and appropriate security mea- sures on its networks. As a result, a third party must audit the company every other year for 20 years and TJX must show improvement in its network security, service provider selection and how it handles consumer information. The retailer also negotiated a settlement reported at more than $40 million with Visa International. r After it was discovered that hackers had accessed the sensitive information of hundreds of consum- ers, an online seller of computer supplies was admonished by the FTC. The company failed to provide reasonable security to protect sensitive customer data such as personal information and credit card numbers. The vendor suffered bad publicity and diminished overall customer confidence. SOURCE: www.ftc.gov [4] WP090991 8/09