Ohio Plans To Encrypt After Data Breach 237
Lucas123 writes "After a backup tape containing sensitive information on 130,000 Ohio residents, current and former employees, and businesses was stolen from the car of a government intern in June, the state government just announced it has purchased 60,000 licenses of encryption software — McAfee's SafeBoot — for state offices to use to protect data. It's estimated that the missing backup tape will cost Ohio $3 million. In September, the state docked a government official about a week of future vacation time for not ensuring that the data would be protected."
hindsight is 20/20 (Score:2, Insightful)
Re: (Score:3)
Technological revolution has been far faster... (Score:2)
TrueCrypt [truecrypt.org] is free encryption for both Windows and Linux. It works extremely well, in my experience.
Re: (Score:2)
Re: (Score:3, Interesting)
Re: (Score:2, Insightful)
Re: (Score:2)
Of course, if you want to play games,
Re: (Score:2)
Backups Won't Be Encrypted (Score:5, Insightful)
And? (Score:3, Insightful)
Re: (Score:3, Insightful)
But they didn't address the problem that actually led to the breach. They're encrypting laptops, but it was backup tapes which were compromised. No mention of those getting encrypted.
Re: (Score:2)
Re: (Score:3, Insightful)
1. What are your sources for that assertion?
2. Have you personally used the software?
3. Have you seen this page [safeboot.com]?
Next time, please think before posting. If you're 100% sure your original statement is valid, I'll gladly stand corrected and eat a healthy slice of humble pie.
Looks right... (Score:2)
Of course, those are a couple of assumptions, but they're pretty likely ones.
Disclaimer: I'm not the grandparent poster.
60,000 licenses? (Score:4, Interesting)
Re: (Score:2)
FDE? (Score:2)
I currently boot my laptop off a USB stick. While I have only configured it to use every single partition encrypted (Linux root, swap, and shared NTFS with Windows), it would be a small step to encrypt the whole disk. (Of course, then I couldn't boot Windows.) I don't currently have passphrases on the key files on that USB stick, but I don't use it for anything else, and, again, that would be a small step.
Obviously, the USB stick cannot itself be encrypted. Must there
Re: (Score:2)
It is actually possible to be pretty confident of that -- enough that I don't bother with trying to encrypt the whole thing (yet).
I say "yet" because I still intend to do my work with the Windows-specific stuff in a virtual machine, and everything else on Linux -- which means I can throw the VM image on an encrypted partition,
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:2)
I know this is a terrible excuse, but paying for a solution *may* make the ignorant masses feel better.
taxpayer: "hey you could have prevented this disaster without spending an assload of money? WTF!"
More to the point, if there's another incident after they buy the software, they can blame McAffee...
Free Software Fails: "Thrifty" fellow who decided to use it gets burned ("Why did you cut corners on important security stuff? Why didn't you shell out some money for a real solution?")
McAffee Software Fails: Buyer takes some heat ("why did you buy that crap?") but seller takes more heat (their product is demonstrated ineffective in a widely published story...)
The fact that there's a software company moti
Re: (Score:2)
Re: (Score:2)
Also, as is obvious to anyone who has been watching the news in the past year, the state of Ohio does not exactly have a stellar, top-talent IT program. It would not be a good idea for the to forge a new path with unsupported software.
Re: (Score:2)
And no software can give you the ability to encrypt boot partitions. Where do you suppose the software itself is stored, then? Maybe the Magical Crypto Fairies will decrypt it from the hard disk first thing? (Of course, I can always throw my boot partition on another device -- I currently boot my laptop off a USB stick.)
Re: (Score:2)
On the Mac side, FileVault is good because it has central management but it has the one dr
Re: (Score:2)
Re: (Score:3, Informative)
Share passwords
Share logins
Print stuff off on paper, take it home and lose it.
and
Re:60,000 licenses? (Score:5, Informative)
sigh
Re: (Score:2)
"So, in light of this embarassing breach, what have you done to ensure the security of Ohio residents' personal information?"
"Well, we spent three million dollars on the best encryption software that we could find. We haven't actually installed any of it, and it is causes some incompatibilities with our existing procedures so we probably never will take it out of the box, and if we do chances are that we will just do a half-assed installation which leaves most of the key features disabled, but gosh darn i
They got it wrong. (Score:2)
Calling all Buckeyes! (Score:5, Funny)
Lots of Horses Still In that Barn (Score:2)
Of course, if you parse the Slashdot article title, you'd think that Ohio plans to do lots of remedial encryption *
Re: (Score:2)
Gotta love government jobs... (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Finagle [wikipedia.org], actually. Murphy's Law has a subtly different meaning.
Interestingly enough, referring to Finagle's Law as Murphy's is itself an example of Murphy's Law in action.
Re: (Score:2)
Raise your hand if you've ever accrued less than one day per month vacation time. Anybody? Seriously? Heck, most retail employees get at least one day a month.... If you're getting less than that in high-tech, you should seriously find a better job... one that doesn't involve pushing buttons on a highly specialized computing device and asking people if they would like fries with that.... Five days a year is just one tier above "burger flipper".
According to Wikipedia, "According to a report by the Fam
Re: (Score:2)
I have my complaints about my job and where I work, but the PTO is a gem and I think has helped retain many of the software engineers when jobs in Silicon Valley are semi abundant.
In tech I think 15 days is a quite common starting point.
Gov't employees usually get lots of vacation (Score:2)
What ya want to bet... (Score:4, Funny)
What are these backup tapes, Kemo Sabe? (Score:3, Insightful)
Re: (Score:2)
So how does MAID compare to RAID?
A week's vacation? (Score:5, Interesting)
I work as a DBA in a nonprofit healthcare organization. If our backup guys lost a tape, and I hadn't bothered to check off the box in our database backup software that says "Encrypt: 256-bit AES", I would lose my job.
This guy got dinged a whopping 1 week of vacation time. That's not even '1 week suspended without pay'. It's the equivalent of having to stay in detention after school.
I need to move over to the public sector or something.
Re: (Score:3, Insightful)
Re: (Score:2)
They frequently do. It's just that it usually isn't the person that's actually responsible because they found a scapegoat.
Re:A week's vacation? (Score:5, Insightful)
What you need to ask is what was the procedure and was the guy following it?
If it's standard procedure for this guy to carry unencrypted data around in his car, it's the guy setting policy/procedure that should be made responsible.
If it is standard procedure for you to encrypt your data, and you fail to follow that procedure you should be disciplined. Better still would be to find a way to make that little check box for encryption on by default. Even better would be to find a way to restrict export without encryption unless it's authorized by a second person. It shouldn't be easy for you to make a mistake that could cause you or your company massive damage.
Re: (Score:2)
In larger shops, I definitely agree with you. There should be both policies *and* technology in place to prevent violations
Encrypted IDE connector? (Score:2)
WTF (Score:3, Interesting)
Intern, backup tape, car
encryption is probably low on the list of security concerns here... just WOW
I absolutely know that I don't want to hear the story of how those four words got used in the same sentence until happy hour is nearly over.
Those 4 words should never be needed in the same sentence. Process is just as important as encryption. That should have been 'backup tape', security company, armored transport, iron mountain in the sentence... oh wait, then there would be no story.
Re:WTF (Score:5, Funny)
Yeah? Well, I wouldn't mind. Not the sentence they added.
Perhaps this one:
"After I checked the backup tapes to ensure that 512-bit AES encryption was working, and that the tapes were still readable, I closed and deadbolted the tape room, and then went out to my car to go to lunch with the new (darn good looking) intern from the art department."
Re:WTF... Decoy? (Score:2)
How Long Before... (Score:2, Insightful)
Brings me back to the question.... (Score:5, Insightful)
It seems logical to me that this kind of information should be on a centralized servers at a state office with managed firewalls and all the rest with only hardwired terminals allowed access with maybe a VPN set up for remote access if absolutely needed out in the field. I know wireless isn't 100% secure and no system is but that just makes logical sense to me.
Re: (Score:3)
Re: (Score:2)
Maybe they think laptops are high-tech Etch-A-Sketches and cannot be networked?
I guess in the end, the department head will be "shaken", but not "stirred", happy hour or not.
A panic reaction (Score:2)
They led the horse to water... (Score:5, Interesting)
I Call Bullshit (Score:2, Insightful)
Re: (Score:2, Insightful)
We have tried to train our employee's to use these tools so as to be secure but I still catch people sending things via e-mail and using unencrypted USB drives that they bought. It's not a huge percentage of
SafeBoot? The poor bastards. (Score:5, Informative)
1. SafeBoot is whole-disk encryption, but Windows-partitions-only. If you dual-boot or use Linux, there is no solution for you except "Please don't lose your laptop".
2. SafeBoot requires a login before you can boot Windows. If you get your password wrong, you must wait a certain amount of time before you can re-enter your passwords. At first, it's not that bad -- a few seconds. But each successive failure increases the time... eventually, you're waiting minutes.
3. SafeBoot encrypts the drive so that you can't access the drive from another machine -- which is what it's designed for, of course. Try being an IT guy in this scenario: You can't perform ANY troubleshooting that doesn't involve booting Windows. If Windows fails to boot, you have to have your hard-drive decrypted (which, for us happens off-site and is a MAJOR pain in the ass). I cannot boot off a Windows CD to use the recovery console to replace damaged registry files. I cannot do a 'repair' install. I could wipe the drive and re-install Windows...
4. The password policy in place requires users to change their password periodically and be of a certain complexity level. Most users have their SafeBoot password written on a piece of paper and taped to their machine, now...
There's a line between security and usability. When SafeBoot works, it appears great -- it doesn't impact system performance *that* much and it encrypts the contents of the entire drive, woo. But when something goes wrong, it becomes a big pain.
To be honest, though, I think the bigger problems for the work *I* run into with SafeBoot is the policies in place, rather than SafeBoot itself.
Re: (Score:2)
In the Unix world, you could just encrypt the $HOME directory of all the users and simply not give them the rights to write outside of that directory. Make sure you don't deploy applications which both keep sensitive data and run as root
Unless Ohio is doing something top-secret with the OS their users are running, I guess I only see the need for encrypting the entire drive when there aren't sufficient security policies in the first place.
Then again, I can do plenty of developme
Re: (Score:3, Informative)
Unix great, but it's not as simple as you put to secure it from threats that have physical access to the machine.
Re: (Score:2)
Point is that you ought to be able to easily separate "these are the directories users can touch" from the "these are the directories which users can't touch". In fact, RedHat did some work on this (look up Stateless Linux). I suspect you can come up with a list of N directories (where N 10 or so) which must be encrypted, and let the OS portions be un-encrypted.
Set up a rat's nest of soft-links to an encrypted partition, make sure the i
The $3 million (Score:2)
Isn't going to help (Score:3, Insightful)
If they want to encrypt people's laptops/desktops then fine
personal civilian data from leaking out they're off by a few orders of magnitude on the
extent of their distributed storage.
Belthize
TrueCrypt (Score:2, Informative)
Re: (Score:2)
My guess is that after the breach, McAffee contacted the guys, who, obviously, haven't got a clue, and in a knee-jerk reaction said "yes, please!".
All those tax dollars... what a waste.
Seriously...Why? (Score:2)
LOL BArnDOrrrrrrz!!!!!! Teh Funnyz! (Score:2)
The reason we're laughing: (Score:2)
They either think we're paranoid, or... I don't know what the fuck they think. Probably just don't want to deal with it...
So now they've been bitten, and now they "get it".
Any time someone finally admits you've been right all along, especially when it's a bit too late to prevent the damage, is cause for both glee and frustration.
Now, I'm not saying that them adopting encryption now is a bad thing, though maybe the particul
I don't see how Safeboot will stop backup tapes (Score:2)
I am not saying workstation security is not important, but here it sounds like someone doesn't even understand the problem that they had.
60,000 licenses for.. (Score:2)
..one gpg command in between tar and the output device.
Why, oh why, didn't I become a government contractor?!?
Re: (Score:2)
Have you looked at what the government pays lately? There is a reason that this stuff happens. In Washington State, at least, government pay grades are about 1/2 to 2/3 of what you can make in the private sector for the same work. If you consult, you can easily make 3 times what the government pays.
You get what you pay for.
Re: (Score:2)
Apparently, they're willing to pay for 60,000 licenses, rather than one slightly more intelligent admin?
Horse gone - Elephant still in room (Score:4, Insightful)
Care about trojans, keyloggers, viruses, and all the other uncountable ways to lose confidential data, not to mention productivity?
Get rid of Windows as well. You'll never regret it.
Re: (Score:2)
MY MONEY! (Score:2)
The security breach went farther than an intern (Score:2, Informative)
Why encrypt the workstations? (Score:2)
instead of data being stolen (Score:2)
Some clarifications (Score:4, Informative)
Well....okay. I live in Ohio and therefore could be in the group of State of Ohio employees, state taxpayers, Ohio lottery winners, and others and since it regarded social security numbers bank account information and such, along with the fact that the theft happened in my hometown of Hilliard, I paid close attention to the story.
What ACTUALLY happened was an INTERN took the device home for whatever reason. Some speculate to have an off-site backup of the data. The intern left it in their car and their car was broken into and the device was stolen.
To clarify the cost: Ohio is providing, free of charge, 1 year of credit monitoring service to each Ohioan that was affected by the theft. That cost estimate is very high. Even at a bargain basement price of $2 per year per taxpayer, that would be about $2 million. The lowest price you can find online is $4.95 per MONTH and about $60 per year.
Further: The official that lost vacation time was not the intern that took the drive home. That official lost the time because they were responsible for ensuring the safety of the data to begin with. Although the intern is the person in possession of the data and should have verified its safety, they were following the procedure that official set up. The intern is not the only one responsible for the theft.
I didn't read the FA ... (Score:2)
This is obviously an inside job. (Score:2)
1. Government official gets idea to make a bit of money.
2. Official gives intern important tape, knowing it will be left in the car.
3. Official knows where intern lives, and goes and steals tape from car.
4. Official sells data on the black market for a dollar value far in excess of a week's vacation time.
5. Official gets to keep his job.
There is no "???" step here.
Really, what are the chances that this intern gets his car broken into on the VERY SAME DAY he happens
Re: (Score:2)
Probably a quick purchase based on needing something now.
Re:Wonder if McAfee payed them (Score:4, Interesting)
No actual loss has ever been reported as a result of this breach. The tape that was stolen was in a relatively obscure tape format. (I don't believe it's ever been reported, but I work with similar systems, and I would guess it's probably 5 1/4 inch format, likely not even in ASCII. Most of the data backups we get are EBCDIC.) It was unencrypted, but in order for someone to get anything off this, they would need the correct hardware, the correct software and they'd really need to know that they were looking for something. Add to that it wasn't reported until weeks after the loss, by which time the thug who broke into the car had log since ditched the useless cassette tape that he stole.
Meanwhile, Ohio taxpayers are spending millions of dollars doing credit checks on every person whose information was potentially on that tape.
I'm not advocating that we forgo due diligence. I take great care in making sure that all backups from my company are encrypted. I hound everyone in the office to make sure their passwords are secure. However, the fact that we're still speding money on this makes me irate. If there was any indication whatsoever that this data was compromised, I'd be OK, but there's a 99% chance that this tape is in a landfill in southern Columbus right now.
Re:Wonder if McAfee payed them (Score:5, Insightful)
The brick being stolen is a security breach, and the information that was carved into it is now to be considered 'out in the open.'
Security through obscurity? Get real.
Re: (Score:3, Insightful)
Re: (Score:2, Informative)
Re:$3 million? (Score:5, Informative)
Math issues aside, if you RTFA (and follow TF link to the original article) you'll see the breakdown:
"The incident is expected to cost the state almost $3 million. Of that total, $2.3 million covers projected and existing enrollment in Debix Inc. credit protection services. Debix enrollment paid for by the state for affected individuals will remain open until Oct. 31. Debix protection will not be extended toward any businesses with information on the lost backup tape."
I highly doubt those licenses are figured into the $3 million estimate.
Re: (Score:2)
Re: (Score:2)
It doesn't make your argument any less valid, mind you, but...
Re: (Score:2)
Re: (Score:2)
And every time someone says, "Let corporations pay for that," they really mean, make us all pay for that, because where do corporations get their money? That's right! It comes out of your pocket
Lets follow your logic here.
Seems like airtight logic right?
But what is the corporation is already making so much money that the loss doesn't actually produce need to increase prices?
Your logic will only really follow when CEO's stop being paid billions of dollars.
Re: (Score:2)
Re: (Score:2)
kaV#29v@a: the d41d8cd98f00b204e9800998ecf8427e of it all!
Re: (Score:2)
MAC stands for Media Access Control. Mac is short for Macintosh. As a fanboy, you should know that.
Of course, I'd much more likely use Linux and either GPG, LUKS, or TrueCrypt, or Windows and GPG, FreeOTFE, or TrueCrypt, depending on what needed to be secured and from whom. In fact, that's exactly what I do, and it doesn't cost me a dime. (Well, except the Windows license itself, which costs the company I work for quite a bit...)
My god... (Score:2)
Then, for more sophisticated protection, there's avast [avast.com] and AVG [grisoft.com]. Of course, these mostly focus on anti-virus.
I recommend Avast, and I use Clamwin, because the only place a virus scanner really helps someone with good online habits is when you've downloaded a file which you know is suspect, and you'd like to scan it prior to use.
On the anti-spyware
Re: (Score:2)
To clarify, ClamWin is a Windows GUI for ClamAV. So if you're just looking for something to install on Windows, you only need to download ClamWin. (Or Avast, if you'd prefer that.)
Re: (Score:2)
My own setup: Postfix/Bincimap/Bogofilter/Maildrop. Plenty of documentation all around.
Of course, I also wrote some custom software that goes somewhere in that stack, so maybe I'm not the right person to say what documentation.
However, I did not put a virus scanner there, as I don't access my email from any mail clients other than Thunderbird and KMail, or any OSes other than Linux. I laugh at virus attempts -- and then train Bogofilter on them.
Jus