Category Archives: Data Loss

The Worlds largest Stem Cell Bank suffers theft of 300,000 client records

The Cord Blood Registry, the world’s largest stem cell bank based in California, has suffered a data breach leading to the theft of 300,000 client records. This could prove very costly to the company, as current research published by the Ponemon Institute reports that the average cost per lost record to a business is now at $214.

The theft occurred in December last year outside a data centre in San Francisco when a CBR employee’s car was broken into. The personal data of the clients was stored on a laptop and on LTO4 tapes, to make matters worse, all the data wasn’t encrypted. The report published by Networkworld, says that although letters have been sent out to all clients affected by the data breach, some only received their letters this month.

The CBR’s director of corporate communications, Kathy Engle states that no reports of identity theft due to the theft have yet to be reported. She goes on to say “The tapes may have contained personal client data of adults (credit card numbers, driver’s license numbers or social security numbers); nothing on children and no health information at all,”

One letter sent to a client was an IT professional who used to work for EMC who said “What on earth are LTO4 tapes doing in a trunk with all this ‘secure’ information? CBR hasn’t described what was actually stolen either. I’m frustrated.”

The CBR stores 350,000 blood collections from umbilical cords which is a rich source in stem cells helping with future medical treatments. The CBR charges over $2000 per client for signing up to the storage with ongoing fees of $125 per year. Working with the Ponemon Institutes figures, this data breach could set the company back 64.2 million dollars and cause irreparable damage to the company’s reputation.

GMail data loss affects 150,000 users

The world’s largest hosted email account provider has experienced a serious technical issue resulting in widespread data loss. Gmail reset around 150,000 user accounts on Sunday preventing user’s access to their data causing serious concern about data security. With Gmail now being heavily used by businesses, and not just home users, this could land businesses in breach of data retention policies which could have financial and legal implications.

Such a serious data breach has forced Google to respond very quickly to the press. In all fairness to Google they have admitted to this being a major fault on their behalf and are working vigorously to try and amend any further consequences. Google are therefore trying to recover all email inboxes and chat logs that were wiped during the data loss.

Google’s statement following the incident read,

“This issue has affected less than 0.08 percent of the Google Mail user base. This is a revised estimate. Google engineers are working to restore full access. Affected users may be temporarily unable to sign in while we repair their accounts,” Google also reported that both they and the affected users have not been amused with the weekend’s events, an obvious remark one would have thought.

The growing importance of email in today’s world is evident and the need to have fast and secure systems is a must. With such pressure being put on email both internally and externally surely companies should better research the options of whether a hosted or onsite solution is best? Whichever direction is taken companies must ensure that they have a secure and reliable online data backup and disaster recovery solution and plan in place.

There are mainly solutions on the market today that can backup and protect all email formats at either the top level or at a granular level. For further information on how Backup Technology can protect email formats please follow this link. http://www.backup-technology.com/online-backup/

Gwent Police Staff emails wrong person thousands of personal records

The Information Commissioners Office (ICO) has recently criticised Gwent Police, after a staff member accidently emailed the personal records of thousands of individuals to the wrong person. The situation was exacerbated by the fact the person it was sent to, happened to be a journalist!

The ICO has found the force in breach of the Data Protection Act and as such has made the Chief Constable sign an undertaking to ensure these leaks never happen again. The signed undertaking document, available on the ICO website, details the exact breach and the remedial action taken by the force to prevent further leaks.

The email contained a spreadsheet with the details of ten thousand Criminal Record Bureau (CRB) enquiries. Whilst the vast majority of the records contained little information 863 records contained the information of the individual concerned with the CRB enquiry. The email was supposed to be sent to five police staff only, however the email was also cc’d to a journalist. The undertaking states Gwent Police must now introduce technical measures to prevent auto completion of emails within internal and external correspondences.

Anne Jones, assistant ICO Commissioner for Wales released a statement saying “It is essential that staff are aware of and follow their organisation’s security policies. Such a huge amount of sensitive personal information should never have been circulated via email, especially when there was no password or encryption in place. We are pleased that Gwent Police has taken steps to prevent this happening again.”

The ICO held back on releasing the information about the data leak until the force had completed its own investigations.

Online Trust Alliance Guidelines for data security Breaches

A report has been released by The Online Trust Alliance setting out guidelines for preventing, detecting and responding to data security breaches. The number of high profile data loss cases that reached the public eye in 2010 has made organisations seriously consider their practices and how they can best avoid such occurrences happening.

The 2011 Data Breach & Loss Incident Readiness Guide is intended as an aid to businesses, nonprofits and governmental agencies in creating data incident plans, with recommendations including best security practices and planning models.

“There is no one size to fit all,” said OTA Executive Director Craig Spiezle. But the recommendations outlined in the report should apply to government agencies as well as to businesses. Despite the growing list of regulatory requirements for using best practices in protecting electronic data, “a lot of agencies haven’t thought through all of this,” he said.

Agencies vary widely in their levels of preparedness, and experience has proved a valuable if not always pleasant factor, Spiezle said.
“Those that are best equipped today are the ones that have had incidents in the past,” such as the Veterans Affairs Department, which suffered a black eye from the 2006 theft of a laptop containing information on millions of veterans, he said.

The OTA is a nonprofit group focused on identifying best practices for ensuring privacy and data security. Although it began in 2004 as an industry organization, members today include the U.S. Senate, Commerce Department and the USPS Inspection Service, and it has worked with the Federal CIO Council and the White House task force developing the National Strategy for Trusted Identities in Cyberspace.

Breaches of personally identifiable information that could be used for identity theft or other fraud have become a high-profile problem. It is compounded by the organized theft, sale and exploitation of the data in a growing underground economy. OTA cited reports of more than 400 incidents exposing more than 26 million personal records in 2010, and said that 96 percent of online breaches were preventable using internal controls recommended in its report.

In addition to breaches of personal information, incidents such as the recent release of leaked classified information through WikiLeaks have caused the Office of Management and Budget to require agencies to assess plans and capabilities for protecting classified information.

Data Loss – Investigation reveals Gloucestershire Police has no idea how or when it lost data on Laptops and USB Sticks

An investigation by a local newspaper in Gloucestershire has exposed numerous cases of data loss in the last 3 years involving the Gloucestershire Police Force. Taking advantage of the Freedom of Information Act, where government held information is freely available upon request, the Echo revealed losses of tapes containing 999 recordings, Laptops and USB sticks.

All losses are recorded in the forces Information Security Register, however, details of where the data was lost, what data was lost and how it was lost in the first place is not documented!

Between October 2009 and September 2010, two separate tapes containing 999 calls were lost, along with a USB Stick containing police force data. The previous year it is recorded that two laptops were misplaced, but a spokeswoman on behalf of Gloucestershire Police insists the devices will have been encrypted. Alexa Collicott states: “We take our responsibility to protect personal data very seriously and robust safeguards are in place for storing and transferring all information held by the constabulary. No police operations have been compromised by the items lost over this period. Police officers and staff are expected to take due care with all police property to ensure that it is handled and maintained in accordance with the law and police policy.”

With solutions such as Remote Data Deletion available to the market, Encryption alone should not be the only method of securing a Laptop. By implementing a remote data deletion solution, were a user can log into a web portal and put into process the removal of all data off a laptop, as well as ensuring data is securely backed up, these incidents need not be cause for continual alarm.

Portable devices pose biggest risk to data security in 2011

A UK think tank has concluded that the prevalence of portable storage devices and mobile phones will be the biggest headache for those who want to protect data and ensure total system security over the coming 12 months.

The Digital Systems Knowledge Transfer Network has made this announcement, with director, Tony Dyhouse, saying that devices capable of storing data in a portable form factor, will allow cybercriminals the opportunity to exploit new security weaknesses in 2011.

It is not just the data storage abilities of these devices but also the fact that they can connect to wireless networks that makes them vulnerable, according to Mr Dyhouse.

He expects hackers to find new ways of hijacking the data being sent and received over Wi-Fi and Bluetooth, allowing criminals to act in a clandestine manner which is difficult to detect, while harvesting significant amounts of information.

Mr Dyhouse believes that the average user needs to wise up to the potential threats posed by using this type of device. He said that the firms which provide portable gadgets will not take responsibility for the security in the event of data loss and, as such, it is down to the end user to act as ultimate guardian of the details stored within.

The potential for human error to result in data loss or even for users to become complicit in data theft, is of great concern among security professionals and the think tank is urging organisations to make employees take responsibility for how they use portable devices.

Mr Dyhouse emphasised the fact that he is not expecting every user to become an expert in data protection overnight, but, instead, is seeking an improvement in the general level of understanding with regards to how cybercriminals operate and how they leverage social engineering to prey on their victims.

Mr Dyhouse told Infosecurity Magazine, that the government’s pledge of investing £650 million to help combat the threat of cybercrime was a positive step, but that when compared to the losses suffered by businesses, it is a fraction of what is required.

Our Customers

  • ATOS
  • Age UK
  • Alliance Pharma
  • Liverpool Football Club
  • CSC
  • Centrica
  • Citizens Advice
  • City of London
  • Fujitsu
  • Government Offices
  • HCL
  • LK Bennett
  • Lambretta Clothing
  • Leicester City
  • Lloyds Register
  • Logica
  • Meadowvale
  • National Farmers Union
  • Network Rail
  • PKR

Sales question? Need support? Start a chat session with one of our experts!

For support, call the 24-hour hotline:

UK: 0800 999 3600
US: 800-220-7013

Or, if you've been given a screen sharing code:

Existing customer?

Click below to login to our secure enterprise Portal and view the real-time status of your data protection.

Login to Portal