The Ashley Madison hack is so two months ago, right? Unless you were personally affected, you have likely forgotten about it. Though you may have not been negatively affected, for the people who have been this revelation of personal data will continue to damage for years to come. So whatever your personal opinion about the site or the people that chose to use it, there are real and valuable lessons here for any company that collects deals with or collects personal information.
The damage from the Ashley Madison hack was extraordinary. There are two linked suicides. Gay men in some countries fear for their lives. Executives of corporations have been outed as potential philanderers. Blackmail has run rampant. The ghost (and lawsuits) of Ashley Madison will haunt people for years. The damage will propagate even longer. Marriages will end. Employees will be fired. Lives will be torn apart. Some of the accused will even be innocent, never knowing how their data got into the Ashley Madison database in the first place. Not to mention the sheer amount of data that is now out there to sit forever on the interwebs. The Ashley Madison hack revealed more than just customer data, including their sexual proclivities and credit cards. Company data and internal communications have also been laid bare to the world. From how Ashley Madison structured their intranets to how they never deleted all those accounts clients thought they had paid to remove. The breach was utterly complete. But how does this affect brands? If you’re at the C‑level, the question is how could it not?
The Impact Team: A New Kind Of Hack
The Impact Team was not your ordinary hack:
“The hackers behind the breach, who call themselves The Impact Team, first released snippets of the data back in July. After nearly 30 days, they then dumped 10GB of customer information, shortly followed by another 20GB of internal data. Minutes ago, the hackers also posted a third data dump.”
Why did they hack Avid Life Media’s site? Ashley Madison wasn’t targeted because of the site’s concept, which encouraged members to cheat on their spouses. It wasn’t because if you had your name added without your knowledge you could pay to have it removed. The biggest motivator for hackers was the way Ashley Madison did business. The Impact Team knew there were no women on the site. They knew Ashley Madison was taking money and defrauding people. The Impact Team tried to set right what they saw as a great wrong: Ashley Madison’s very existence. The hackers even warned Avid Life Media that if they didn’t change their ways, pain was coming. That pain would be in the form of hacked and stolen data to be shared with the world. To prove their intent, The Impact Team sent stolen information to Avid to prove they had indeed compromised their system. Avid did nothing, for months. They seemed to take the tact that ignoring it made it not so. Then Impact released everything they had taken – all 30 or so gigabytes. Is the Impact Team done? Not yet. Ashley Madison is said to be the first in a line of sites they will be taking aim at in the near future. Some have applauded this effort because of who Avid is as a company. But what if someone loathes something your company does? What if someone despises your CEO or your business practices and wants to wreck your reputation with your loyal customers? Hacking is becoming scarily easy. The tools that make it easy are now conveniently available to just about anyone. Instructional videos and sites that provide step-by-step hacking instructions can be found nearly anywhere online. It no longer takes someone with a deep understanding of how sites work or the Internet functions to target you. Are you protected? What is your company doing to prevent this happening to you?
Site & System Security
When is the last Time you had your Code Tree checked? When did you have your last security audit? Do you know where your systems are vulnerable? If the answer to any of these questions is no, then you might just be leaving yourself open to a situation similar to Ashley Madison. Sure you may not have people’s proclivities tied to their name on your servers, but if you are collecting data or have internal documents and emails on a connected system you too could be vulnerable. So what do you do? Everyone has their own security protocols and we could never cover all options here, as they are as diverse as they are variable. However there are steps you can take to make sure you don’t get that call that your data is now in the hands of those who wish you harm.
1. Security Assessments & Risk Management
When is the last time you had your site and your networks checked for vulnerabilities? Did you know you could set up a command and control center inside your four walls with a printer firmware update? Did you know that it’s possible to create a working company badge with a search on eBay and about $50? Are you vulnerable to simple password fails, like someone on your team using “12345” for any accessible interfaces? As we move into the Internet of Things, this is just going to open more opportunities for hackers. What have you done to assess your risk? Takeaway If you can’t remember when your company did a company wide security audit, now is the time. These should be done on an ongoing basis – not just for your website, but anything connected to the Internet. Even air-gapped computers aren’t immune from attack. Hire a company to review not on your online security, but the weak links in your offline structures, especially your people. Preventative measures aren’t always cheap, but they are much less expensive than the alternative.
2. Social Engineering & PIS
Have you trained your staff to understand how they can be used in an attack on your company? “PIS” or Person In Seat is the most vulnerable access point in any corporation. What has your company done to prevent access through your own staff? What have you done to make sure your staff is motivated to prevent someone from attacking you? Takeaway Teach and train your staff about how they can be weakest link in a secured system. Do they know about “phishing”? Do they know why they can’t use simple passwords? Do they have protocols in place for those times when someone tries to retrieve access to the network outside the system? Do they know them? They should. The recent attack on the head of the CIA’s AOL account was almost solely done utilizing social engineering. Protect your company and teach your people how not get used to help someone gain network or site access.
3. Network Monitoring Software
While your network is likely designed to protect against attempts to enter through the front door, this is useless if they can find a way through a locked door you don’t know about. So what do you do? Takeaway The attacks against Sony, Ashley Madison, and even the actions of Edward Snowden could have been stopped (or at least the harm reduced) with the addition of network monitoring. Network monitoring will warn you about any unusual activity, such as large amounts of data leaving through an “open door” you just found out about. It gives you time to react and shut it down. Maybe someone will leave with a beer you left in the refrigerator, but the kitchen will remain intact.
4. Response Readiness
In today’s cyber environment, you will likely suffer breaches. Most of them will probably be small, and maybe even some insignificant. But what do you do when all preventative measures have failed and you have lost control? Are you ready to respond? Do you have protocols in place? Does everyone responsible know what to do? Takeaway Having your network compromised is inevitable. Even the most highly secured locations can be and have been at the receiving end of hacker’s intent. When the inevitable attack happens, what do you have in place to stop it? What protocols have you given your team? Have you given them the authority to act? With the help of cybersecurity experts you can stop an attack in its tracks and minimize the damage. However, if your team can’t act with the necessary authority, procedures aren’t in place to deal with the intrusions, or there isn’t a plan on the table for how to shut your systems down or isolate the intruder, then you may make extremely expensive mistakes. Companies like Mandiant (FireEye) Security have put together a quick fact sheet covering what you need to know when thrust into this frightening position.
5. Next Steps?
OK, you did everything you were supposed to do. You secured your networks, trained your people, added the right security software, even had a security firm run an in-depth audit over your entire process. But you still got hacked. Data was stolen. People’s identities are at stake. Maybe they got trade secrets or, like in the case of Ashley Madison, they are set on embarrassing you and your customers. What do you do now? When a breach occurs, there are many considerations. What are the legal implications? How can you protect trust with your users? How do you minimize the damage? While there are no easy answers, what is most important is that you know exactly what your company has to do in the event this happens. Time wasted between the attack and the reaction is time that can land you in more dangerous waters. Whether it is damage to your reputation, your users, your team, or all of the above you have to know what the plan is when (not if) this happens.
Protect Your Brand’s Assets Now!
While we all hope the worst doesn’t happen to us, the likelihood of never getting compromised is unrealistic. Don’t be the lowest hanging fruit. Taking these steps should provide enough protection from those who want to harm your brand.