Tue. Apr 23rd, 2024
ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.
 

Data Breach Challenges and Social Media

Last week I had an excellent opportunity to learn from Symantec’s Director of Product Marketing – David Dorosin – about both Targeted Attacks on Intellectual Property and how Symantec is providing new tools to help address the challenges of these attacks. This conversation was of special interest to me as it provided an opportunity for me to see how leading security vendors are beginning to address the data breach challenges associated with unconventional unstructured data emanating from social media.

As part of the discussion with Mr. Dorosin, he kindly shared the following information points – information points that may be useful as you consider data security.

Targeted Attacks on Intellectual Property

The anatomy of a breach typically follows a four step sequence:

• Incursion
• Discovery
• Capture
• Exfiltration

This four step sequence usually can be categorized into either mass attack or targeted attack approaches.

Mass Attack Characteristics

• Incursion – Generic social engineering By-chance infection.
• Discovery – Typically no discovery, assumes content is in a predefined and predictable location.
• Capture – Predefined specific data/data which matches a predefined pattern such as a credit card number.
• Exfiltration – Information sent to dump site often with little protection and dump site serves as long term storage.

Targeted Attack Characteristics

• Incursion – Handcrafted and personalized methods of delivery.
• Discovery – Examination of infected resource, monitoring of user to determine other accessible resources, and network enumeration.
• Capture – Manual analysis and inspection of the data.
• Exfiltration – Information sent directly back to attacker and not stored in known location for extended period.

To address the challenges associated with data breaches from targeted attacks, it seems reasonable for organizations to have a stepped approach that may include but not be limited to:

• The Development and Enforcement of IT Policies
• The Protection of Information
• The Management of Systems
• The Protection of the Infrastructure

In translating the elements of this stepped approach for addressing targeted attacks into practical offerings, Symantec is announcing today as series of security suites designed specifically to meet the challenges associated with data breaches. These offerings include:

• Control Compliance Suite 10.0 (The Development and Enforcement of IT Policies)
• Data Loss Prevention Suite 10.5 (The Protection of Information)
• IT Management Suite 7.0 (The Management of Systems)
• Symantec Protection Center and Symantec Protection Suite (The Protection of the Infrastructure)

Of special interest to individuals and organizations charged with data breaches associated with social media, the Data Loss Prevention Suite 10.5 provides some key capabilities worth considering. These capabilities include but are not limited to:

• Visibility and Control of Unstructured Data
• Protection for Social Media Sites (Examples: Twitter, LinkedIn, YouTube, etc.)
• Protection for Private Clouds (Example: Citrix)

Specifics of this new Data Loss Prevention Suite offering can be seen in today’s press release (13.4.2010) from Symatec – the release is provided below for your use/consideration.

Symantec Helps Businesses Prevent Data Loss in Evolving IT Environments

Symantec Finds Social Media to be a Top Concerns of CIOs

LAS VEGAS – Symantec Vision 2010 – April 13, 2010 – Symantec Corp. (Nasdaq: SYMC) today announced an updated version of Symantec Data Loss Prevention designed to help businesses prevent data leaks in their changing IT environments. Symantec Data Loss Prevention 10.5, the latest version of Symantec’s market leading data security suite, enables the use of social media while guarding against data loss, protects information in private clouds and helps organizations take ownership of unstructured data, such as documents, spreadsheets and email.

“Information is today’s most critical business asset and traditional boundaries for it no longer exist,” said Rich Dandliker, director of product management, Symantec. “Constantly evolving IT environments drive the need for new data protections. To protect information, Symantec must go where the data goes.”

Helping Businesses Go Social

Social media is being increasingly used in business for collaboration and communication. Yet in Symantec’s 2010 State of Enterprise Security study, Symantec learned that 84 percent of CIOs and CISOs considered social networking sites to be a serious threat to their security. To enable the use of social media while addressing this threat, Symantec Data Loss Prevention has enhanced compatibility with Web 2.0 sites – such as Twitter, YouTube, MySpace, Facebook, LinkedIn, and Meebo – to stop the flow of sensitive data. Symantec Data Loss Prevention also minimizes IT support costs by providing a more transparent Web experience for end-users that seamlessly prevents data exposure without confusing the user with broken links or error messages.

Secure Private Clouds

Companies are increasingly turning to private clouds to help them cut server and storage costs. However, security is a chief concern with clouds, even when they live inside the corporate firewall. For example, organizations need to prevent sensitive information from being inappropriately transferred to unmanaged laptops and desktops, which could happen with remote employees or outsourced employees who need access to confidential data. To combat this, Symantec added new endpoint event coverage for workstations running virtualized applications and desktops, including Citrix XenApp and Citrix XenDesktop.

Take Ownership of Unstructured Data

Businesses are also drowning in unstructured data – such as documents, spreadsheets, and emails – which continues to grow exponentially every year. The key challenge for organizations is determining what information is stored in unstructured files and who is responsible for the data. To help companies solve this mounting problem, Symantec recently introduced Symantec Data Insight that is now integrated into Symantec Data Loss Prevention. With Data Insight, organizations can discover where their most critical information lives, monitor its usage and protect it by automatically inferring data ownership to speed up the incident remediation and data clean-up process.

Expanded Interest in Data Loss Prevention

Interest in data loss prevention is high with 89 percent of organizations at least considering a DLP solution, according to Symantec’s 2010 State of Enterprise Security study. New buying centers are emerging in organizations that do not have complex data security requirements and are interested in preventing the loss of specific information, such as customer data, through common endpoint gaps, such as email, Web and USB. To support these new buyers, Symantec now offers Symantec Data Loss Prevention Standard Edition, which provides leading data loss prevention technology to protect against this specific type of endpoint data loss.

Availability

Symantec Data Loss Prevention 10.5, with new support for Windows 7 64-bit, Symantec Data Loss Prevention Data Insight, and Symantec Data Loss Prevention Standard Edition are now available.

 

Have a Request?

If you have information or offering requests that you would like to ask us about, please let us know, and we will make our response to you a priority.

ComplexDiscovery OÜ is a highly recognized digital publication focused on providing detailed insights into the fields of cybersecurity, information governance, and eDiscovery. Based in Estonia, a hub for digital innovation, ComplexDiscovery OÜ upholds rigorous standards in journalistic integrity, delivering nuanced analyses of global trends, technology advancements, and the eDiscovery sector. The publication expertly connects intricate legal technology issues with the broader narrative of international business and current events, offering its readership invaluable insights for informed decision-making.

For the latest in law, technology, and business, visit ComplexDiscovery.com.

 

Generative Artificial Intelligence and Large Language Model Use

ComplexDiscovery OÜ recognizes the value of GAI and LLM tools in streamlining content creation processes and enhancing the overall quality of its research, writing, and editing efforts. To this end, ComplexDiscovery OÜ regularly employs GAI tools, including ChatGPT, Claude, Midjourney, and DALL-E, to assist, augment, and accelerate the development and publication of both new and revised content in posts and pages published (initiated in late 2022).

ComplexDiscovery also provides a ChatGPT-powered AI article assistant for its users. This feature leverages LLM capabilities to generate relevant and valuable insights related to specific page and post content published on ComplexDiscovery.com. By offering this AI-driven service, ComplexDiscovery OÜ aims to create a more interactive and engaging experience for its users, while highlighting the importance of responsible and ethical use of GAI and LLM technologies.