Despite what you may think, IT security *is* your business

3D illustration of grey office for routine work

Cubicle hellI often wonder if, early in my career, working for large, cold, faceless corporate giants, I was wasting time fighting against all hope that I could make a change in how seriously they took the security and integrity of their IT systems.

Futile as it may have seemed, I wouldn’t give up that experience for anything. It provided a ton of useful insights that have allowed me to see through their eyes and provide more salient arguments to effect change.

One of the organizations I worked at had IT security issues on a daily basis: viruses, lost devices, stolen data and intellectual property walking off with recently dismissed employees.

I regularly attempted to draw management’s attention to the problem, and the fact that we had all of the software, manpower and will we needed to fix it. All we had to do was adjust our attitude toward the problem.

Creative Commons photo of an Acme brick courtesy of gruntzooki's Flickr photostreamThe reply? “We aren’t in the business of IT or security. We make widgets. We maximize investor returns by buying, selling and trading subsidiaries to create wealth.”

Well, I have news for companies who adopt this attitude. It simply isn’t true anymore.

This same company spent millions of dollars monthly maintaining their fleet of delivery trucks, the robots in their factories and even the coffee machines in the breakroom.

We once had an outage due to a power failure at a critical IT facility that cost the organization over $1 million an hour because robots needed the computers at that facility to tell them what to make. When that’s the case, can you afford not to be an IT company?

In this day and age, for an organization to ignore IT security is patently irresponsible. If you really feel that way, perhaps you should take down your website, turn off the internet connection and live in a world that matches your fantasy.

What prompted this rant? According to’s 2011 yearly report more than 126 million personally identifiable records were compromised in 369 incidents.

Dataloss DB 2011 report

As most incidents go unreported, those numbers are only the tip of the iceberg. In fact, most jurisdictions don’t require organizations to report incidents, so this represents only those that are regulated and those that were “outed.”

It is time to recognize that the internet is a utility, and your computers are property that you have an *obligation* to properly maintain for the safe operation of most businesses.

A perfect example of not learning or apparently caring about security very much is While they have finally revised their password reset process, they clearly have not embraced protecting your information. was compromised in December 2010 and had over 17 million user IDs and passwords stolen, all of which were stored in plain text. They even offered to email you your password. Any organization that can return existing passwords to a customer is not even trying to securely store them.

I checked out their site today to determine if they learned any lessons from the breach. While they will no longer send your password when you attempt to reset (Good!), they let me choose a password of “password” when I created my account.

Strangely, when I then tested out the password reset process it insisted on an eight character password that had to contain a numeral (which arguably lowers the entropy). Note that my prior password of “password” clearly hadn’t been held to this standard. Requiring password complexity in only some circumstances and not others is pointless. password reset

It is unclear if the passwords are now securely stored, but it almost doesn’t matter. Their web server supports HTTPS, but as soon as you click a link like “Login” or “Join” it reverts to an unencrypted connection.

Packet capture of account creation on Care2

Yes, everything you enter into the form fields, including your user ID, birth date, password, and personal group preferences, like NAACP, GLBT Rights, Pagans and Planned Parenthood, are transmitted in plain text and easily intercepted on public WiFi.

Care2 form data captured over WiFi

Of course proudly displays the TRUSTe symbol to assure you they respect and protect your privacy. I contacted TRUSTe for comment, but they have not yet returned my call.

George Friedman, CEO of StratforOn the other hand you have Stratfor. While they didn’t learn from others’ mistakes, they took the site down until they could safely bring it back online. George Friedman, their CEO, took full responsibility even stating “That’s not a justification. It’s simply an explanation.”

If you work for one of the companies with this malady, please speak up. Make it an issue and don’t let it be swept under a carpet. Make sure your management is aware of what has happened to others in your industry and make recommendations that can mitigate the risk.

While Stratfor may have lost information on 850,000+ accounts, Care2 lost almost 18 million and has still not embraced fixing the type of problems that led to their compromise to begin with.

All of us have a role to play in a more secure internet and it’s high time we admit we have a problem and get on with fixing the issues as quickly as possible.

If your company has customer information, takes credit cards or has computers that use passwords then IT security is in fact your business.

Creative Commons photo of an Acme brick courtesy of gruntzooki’s Flickr photostream.

Update: If there is any question as to the value provided by TRUSTe, they never bothered to return the press inquiry I made at the time of publication.