Controlling Security Breaches

SenseiSteve

HD Moderator
Staff member
Last year a well known web host sent a message to its clients about a security breach of one of its employee accounts. They followed that with this thread in their forum.

"This morning, we sent a notification to a group of our customers possibly affected by a compromised employee account’s access to our internal customer management portal. We will be sending an additional communication to all customers with information about the apparent security breach, but in the meantime we would like to answer any additional questions about the communication in this thread.

Please understand that we will not provide specifics information about the security breach due to the sensitive nature of the investigation, but we will do our best to provide as much detail as possible. As we assured in the note, based upon our security review of access logs, we do not believe any credit card information was compromised.

We strongly suggest you implement a security best-practices approach by immediately taking four steps to mitigate risk:

•1. Change your xxxxx log-in passwords immediately and do so again every 60 days.
•2. Change your server passwords and do so again every 60 days.
•3. Be alert to any suspicious activity on your account.
•4. If you suspect any unusual activity, please retain your access logs along with any other information and contact us as soon as possible."

This should raise some questions.

What security measures do hosts normally have in place (regarding their employees) to protect their clients? Are they allowed to bring in usb thumb drives (some are marketed very cleverly looking like wrist bands or writing utensils)? What about PDA’s? Could they place data on these devices and simply walk out the door with gigabytes of files? Could those files be broadcast on the Internet, or used as blackmail?

They mentioned implementing a security best practices approach. Regardless of your level of comfort with your current host, these four suggestions need to be implemented to minimize your risk. I can’t emphasize this enough - your data is your business. Lose your data and you risk losing your business!

What about inside your own business?

The same applies to in-house servers and workstations. Most security breaches are by disgruntled employees. It’s amazing how many companies give administrative privileges to low level supervisors. Entire databases can be downloaded in minutes with thumb drives, then transported offsite.

What about security or IT audits?

Financial institutions have very strict guidelines with respect to security, but what about the thousands of small to medium sized firms that comprise the majority of businesses - your local printer, clothing retailer, auto repair shop, electrical contractors, car dealerships? How at risk is their data - and your data as their consumer? It’s astonishing how many firms broadcast unsecure Wifi networks. What’s more alarming is how easy it is to intercept and infiltrate their networks. How many times have we been alerted to intrusion theft of well known retailers, just in the past year?

Would an IT audit be worthwhile? Volumes of information has been written about IT audits and IT security. Do you trust your IT department to have fully provisioned and managed security? Most owners have no clue how vulnerable their companies are without a 3rd party audit.

My recommendation

Dot your i’s and cross your t’s with disaster recovery and business continuity plans. If you receive a notice like our web hosts comrades, follow their advice. Do it as a matter of habit. Being habitually secure is far better than being victimized with no recourse.
 
Good info Steve, some companies now require changing of password every 60 days built into their portal, same is true for the workstations access to network.
 
Security is somathing you need take care personally. That is obvious. In any case nice post in here. Thanks
 
Security and server up time is the key feature of hosting support system. If any one loss that means loosing own clients.

nice post !!
 
Very insightful article. It certainly raises questions of commitment, and speaks volumes about each provider. Thanks, Chris.

Cheers :) I do agree about it speaking volumes - I'm going to do a follow-up on the HD blog on Friday, hopefully with quotes from FireHost and Mr. Mitnick intact.
 
Cheers :) I do agree about it speaking volumes - I'm going to do a follow-up on the HD blog on Friday, hopefully with quotes from FireHost and Mr. Mitnick intact.

Good idea Cris. That would be great if you can us updated with fresh information regarding that
 
I might be on my own, but kind off agree with Hostedhere, with the amount of presure from multiple hackers concentrated on one account, is it going to be cost effective for the owner and fair to the other accounts on the server.

I think its unfair to judge them.
 
Great information,thank you for sharing.Security is one of the key elements of hosting support system.Steve's advice is very great to everyone.
 
Security always plays a pivot role in web hosting & Internet. It is always a prime concern of customer when they host site with their web host. Tight security means enhances uptime.
 
Yes,Definitely the security plays a important role in web hosting & Internet.Customer usually take care about their websites will not get down at anytime.High security means high uptime.
 
With the huge increase in bot nets and "team-hacking" lately security is more important than ever.
I am always amazed at clients who don't understand why their password can't be Joe123 or Atlanta (because they live there) and then you can imagine how much "junk" is probably on their computers (they are probably part of a bot net themselves) they don't understand a password like those can be hacked in seconds-not even a minute.
There's a great series of videos by a security firm on Google video that shows over 100 malicious objects downloaded in a half-second on a visit to a "drive by" page and another that shows a common password cracker any kid can download and the guy used 30 passwords of various levels. the 5-8 "easy" ones didn't take 30 seconds, the "better" ones took 5 minutes, the good ones took 24 hours and only the best survived that. The presenter said he program would break those within a week but the hacker would move on before then.
These videos illustrated how tough security is these days, the drive by had 80+ spyware programs & bots and approx 20 that linked directly to other sites sending your keystrokes in real time :smash:
 
Back
Top