Posted by:
admin
16 years, 1 month ago
As we have discussed elsewhere in this Blog, there is value in protecting your information assets. We've talked about the impact of information security breaches on stock price. Well, Choicepoint provides a good case in point. This was not a “hacker” attack as labeled in the popular press (further moving the definition of that word from its original meaning), but rather a traditional scam that took advantage of a lax credentialling process (yes, Irony with a capital I) that apparently is fax-based.
(Perhaps if this process were done electronically, Choicepoint's information security staff would have improved the controls. Their CISO won CISO of the Year in Atlanta last year.)
Choicepoint's stock dropped 10% yesterday. It is down to $39.30 from a 52 high of $47.95 just earlier this month.
The market is reacting to a number of things. Choicepoint handled the affair poorly, notifying only California residents as required by law and not everyone. Georgia is now looking at a privacy law similar to SB1386. Regulation means increased costs. Choicepoint is trying to recover by offering to pay for credit monitoring services (probably provided by it's former parent, Equifax) and it has stopped providing service to it's 17,000 small business customers until they can be re-credentialled. That's more costs and less revenue. Finally, lawyers are starting to look at class actions – more uncertainty means more risk means higher cost of capital.
It brings up a point made before here: good companies have good processes that protect their assets. They have good information security as a result of that, not the other way around. I think information security and IT professionals are often disappointed that the rest of management doesn't understand that.
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)