This is the Modern World: toss your phone & laptop if you want to protect your data when visiting the US
Here's a worrying video showing how easy it is to hack the new Furby Connect toy via a mobile phone app and its insecure Bluetooth protocol connectivity. But we love the idea of a shop full of Furbies chanting "We shall build a wall" and then launching into a Rickroll!
Here's the first of a new series of tech columns I'm writing...
Forget hackers and terrorists, it's the "tree rats" we have to worry about! Link includes video.
Great cartoon in the New Yorker by Emily Flake - the caption reads "I don't want to alarm you but I'm pretty sure I heard the Elf on the Shelf speaking in Russian!"
Guest cybersecurity comment by Tim Hyman* of 2Twenty4 Consulting
The General Data Protection Regulations are the most significant development in data protection that Europe, possibly the world, has seen over the past twenty years. There is a much greater emphasis on accountability and the principle aim is to move control back to the end user or data subject. To reinforce this there are many new auditable obligations and whilst the maximum penalty of 4% of global revenue grabs the headlines there are a number of other significant changes.
One of these relates to the lesser known penalty of 2% of global revenue for administrational non-compliance. New powers of audit mean that a data breach is not required before penalties kick in, lack of the appropriate documentation and/or protective processes are enough to warrant penalty. The person responsible for overseeing and maintain the new compliance requirements is the DPO or Data Protection Officer.
Not all businesses will be obliged to appoint one but even those that do not will still need someone to monitor compliance and take responsibility for data processing records and liaising with the authorities and data subjects.
GDPR states that a firm will require the appointment of a DPO in the following circumstances:
Data controllers (law firms) and processors (cloud service providers) shall designate a data protection officer in any case where:
• the processing is carried out by a public authority or body
• the core activities of the controller or the processor consist of processing operations which, by virtue of their nature require regular and systematic monitoring of data subjects on a large scale; or
• the core activities of the controller or the processor consist of processing on a large scale of special categories of data pursuant to Article 9
For law firms, it is the latter of these categories that will almost certainly apply. Having someone responsible for Data Protection is nothing new and it should be a straight forward conversion from the existing COLP or Head of Compliance to the new formal DPO role.
The duties of the DPO are unsurprising but with the additional requirement to deliver internal user awareness which when aligned with existing Information Security education will be a welcome addition to other compulsory learning participation such as anti-money laundering. DPO duties include:
• to inform and advise the law firm of their obligations pursuant to this Regulation;
• to monitor compliance with GDPR,
• awareness-raising and training of staff
• internal audits
• to provide advice regarding the data protection impact assessment and monitor its performance
• to cooperate and act as the contact point with the supervisory authority;
Perhaps more interesting however, and the reason for a close IT/DPO alliance going forward are the new obligations of a business regarding the role.
LAW FIRM OBLIGATIONS
All firms will have the following obligations to a DPO when in existence:
• ensure that the data protection officer is involved in all issues which relate to the protection of personal data (this will include IT solutions and services)
• provide resources necessary to carry out those tasks and access to personal data and processing operations,
• He or she shall not be dismissed or penalised by the firm for performing his tasks.
• report to the highest management level of the firm
The fact that a firm is obliged to ‘provide the resources necessary’ represents an excellent opportunity for IT to work with the DPO to achieve the appropriate budget and resources to deliver a robust Information Governance strategy – something that IT Directors have been struggling to justify on best practice principles as opposed to obligation.
So, with the DPO responsible for ensuring appropriate data protection measures are in place and with the new power to ensure resources are provided, a much closer alliance between IT and Risk will be the ideal way to provide the technical and legal expertise required to ensure compliance.
This is also borne out in the work needed to prepare the business for the May 29 2018 compliance deadline. To develop a GDPR Compliance Plan, it is first necessary to document current data practices and processes and understand any risk. This is achieved by first carrying out an Impact Assessment which can be broken down into three phases, Discovery, Risk Assessment and Mitigation Planning.
A Data Protection Impact Assessment is a tool designed to enable firms to work out the risks that are inherent in proposed data processing activities before either the legislation deadline in May or in future when planning a new system or process. This, in turn, enables firms to address and mitigate those risks before the processing begins.
It may also even be mandatory as where a new processing activity is proposed (especially where new technologies will be used) resulting in a high degree of risk for data subjects, the controller must first conduct an Impact Assessment. A single Impact Assessment can cover multiple processing operations that present similar risks.
Essentially the Impact Assessment has 3 key activities:
Data Mapping: A comprehensive and documented survey of all systems and processes where personal data is at play
Risk Assessment: An assessment of potential non-compliance based on the findings of the data and process mapping
Mitigation Plan: A documented approach to the risks discovered using a REMOVE, REMEDIATE or ACCEPT approach.
GDPRREADY COMPLIANCE FRAMEWORK
To assist firms with the initial preparation phase including the Impact Assessment we have developed a GDPRready Compliance framework that has 4 key phases
Step 1 – EDUCATE
GDPR Overview Workshop - an onsite workshop to build GDPR awareness and secure buy-in with your key internal stakeholders, custom-tailored to the needs of your firm.
GDPR Assessment workshop - A workshop for internal staff responsible for owning the assessment process.
Step 2 – DISCOVER
Impact Assessment – using our GDPRready Data Register and GDPRready Impact assessment templates you will document, data flows, gap analysis, risk assessment and remediation plans.
Step 3 – PLAN
GDPR Preparation Plan – document actions needed to prepare for and maintain GDPR compliance. Understand budget required and systems and processes that require modification.
Step 4 – MAINTAIN
Maintain compliance by aligning processes with our 12 best practice Information Security policies
GDPR is only 18 months away and any firm that has already started an Impact Assessment will know that they need all the time available to prepare. This a business project, owned at board room level but best managed and delivered by the IT/Risk team. This is an excellent opportunity for IT to provide leadership in a high-profile business project, get budget for Information Governance projects and now mandatory Security Awareness training and provide Impact Assessment advice to the firm’s clients. The Data Protection Officer will have a far reaching range of new responsibilities and powers – make them your best friend.
* Tim Hyman is also producing The Essential Guide to GDPR - email HERE for details.
Yesterday it was reported that both TalkTalk and Post Office broadband customers have had their online access cut by an attack targeting certain types of internet routers. A spokeswoman for the Post Office told the BBC that the problem began on Sunday and had affected about 100,000 of its customers. Talk Talk also confirmed that some of its customers had been affected, and it was working on a fix. It is not yet known who is responsible for the attack. (It would also appear that local telco KCOM in Hull suffered similar problems last Saturday.)
In the light of these developments, Andy Green, a senior technical specialist at Varonis, comments: The lessons that should be learned from these ongoing Mirai attacks is just how vulnerable we were as a result of our own IT laziness. Sure, we can excuse harried consumers for treating their home routers and IoT gadgetry like toasters and other kitchen appliances – just plug it in and forget about it. So what excuse do professional IT types have for this rookie-level behaviour?
Not much! Unfortunately, default-itis still plagues large organisations. As long ago as 2014, the Verizon DBIR specifically noted that for POS-based attacks, the hackers typically scanned for public ports and then guessed for weak passwords on the PoS server or device – either ones that were never changed or were created for convenience, “admin1234”. This is exactly the technique used in the Mirai botnet attack against the IoT cameras.
Even if hackers use other methods to get inside a corporate network (phishing, most likely) they can still take advantage of internal enterprise software in which defaults accounts were never changed. For those organisations who think that the Mirai botnet incident has nothing to with them, or have to convince their board of this, here are two points to consider.
1. The lesson of the Mirai botnet attack is that the perimeter will always have leaks. For argument’s sake, even if you overlook phishing scenarios, there will continue to be vulnerabilities and holes in routers, network devices, and other core infrastructure that allow hackers to get inside.
2. Human nature tells us that IT will also continue to experience default-itis. Enterprise software is complicated. IT is often under pressure to quickly get apps and systems to work. As a result, default accounts and weak passwords that were set for reasons of convenience – thinking that users will change the passwords later – will always be an issue for organisations.
You have to plan for attackers breaching the first line of defences, and therefore have in place security controls to monitor and detect intruders. In a way, we should be thankful for the “script kiddies” who launched the Mirai botnet DDoS attack: it’s a great lesson for showing that companies should be looking inward, not at the perimeter, in planning their data security and risk mitigation programs.
Weird Tales Radio
Follow this link to access all episodes of the Urban Fantasist Weird Tales digital radio/podcast show. Click player button to hear latest show.
New on the Grievous Angel
We've a delicious mixture of bite-sized sci-fi, fantasy, and dystopian poetry for you from Francis W. Alexander, John Reinhart, Holly Walrath, Greg Schwartz, Susan Burch and Lauren McBride. You can read the HERE
This is Urban Fantasist
Curated by former barrister and Reuters correspondent turned writer, award-winning tech journalist, best-selling non-fiction author, sometime werewolf hunter, and digital radio host Charles Christian – Urban Fantasist is here to inform and entertain you with news and comment on weird tales, urban legends, tech, geek stuff, cyberspace, science fiction, magick, folklore and history.
Also includes the Grievous Angel webzine for free-to-read, sci-fi and fantasy poetry and flash fiction.
Plus the Gonzo News section providing news and comment on tech matters, aspects of cyberspace, including hacking and socialmedia, as well as geek stuff.
And the Urban Fantasist Weird Tales digital radio/podcast archive.
Plus links to Charles Christian's books including fiction, nonfiction, and all the latest reviews.
"Charles Christian defiantly makes my world a brighter, funnier place."
"The legendary Charles Christian at his eclectic best... his insight and humour alone make this a must-read blog."
"His tech journalism is always witty. He has a talent for pricking the overblown claims of suppliers."
"Charles Christian does awesome!"
The Urban Fantasist website is now averaging over 3000 page views daily and 100,000 page views a month.
Over 174 weeks in Amazon's writing reference books bestsellers Top 20.
Can I copy content from this site?
Yes... providing you properly credit it. Here's the technical bit: Urban Fantasist content is licensed under a Creative Commons Attribution 3.0 Unported License which means it may be shared, remixed or used commercially as long as Urban Fantasist or Grievous Angel is cited as the source. If you have any questions, please email or use our contact form.
Feel free to drop a few PayPal coins in our Tip Jar to help us meet some of our running costs. Chocolate, tea, flasks of wine, books of verse, the usual.
Copyright © Charles Christian
& WordsandVision Limited 2017
Grievous Angel ISSN 2059-6057
This site is fuelled entirely by green tea, sarcasm and dark chocolate.
Contact Address: Oak Lodge, Darrow Green Road, Denton, Harleston, Norfolk IP20 0AY, United Kingdom