<node id="65457">
  <nid>65457</nid>
  <type>news</type>
  <uid>
    <user id="27310"><![CDATA[27310]]></user>
  </uid>
  <created>1302254980</created>
  <changed>1475896110</changed>
  <title><![CDATA[Georgia Tech Expert Gives Tips on Safeguarding Against Data Theft]]></title>
  <body><![CDATA[<p><em>Nick Feamster, assistant professor at Georgia Tech's 
College of Computing and researcher at the Georgia Tech Information 
Security Center offers his expertise on the Epsilon data breach and what
 users and custodians can do to protect their data.</em></p><p>The
 Epsilon data leak incident was serious, as it exposed a large number of
 people to an attack called "spear phishing,” whereby an attacker 
targets specific users or organizations with attempts to steal personal 
information.  However, it is also important to realize that this 
incident could have been much worse. Many third-party organizations, 
ranging from identity management companies  and large cloud service 
providers, like Google, have aggregated large amounts of our personal 
information in one place, making us increasingly vulnerable to the type 
of attack we saw with Epsilon, whereby a single breach can result in the
 compromise of a large amount of user data.  </p><p>There are two big 
lessons we should take away from this incident.  First, we must raise 
our own awareness about where our data is stored and become more 
cognizant of how we might be making ourselves vulnerable to these types 
of incidents by allowing data about us to be aggregated in just a few 
places.  Second, we need better security tools: software will remain 
vulnerable, and compromise is inevitable.  </p><p>Although this may be 
one of the largest data leaks we have seen in U.S. history, this is not 
the first instance of a very serious data leak. In the past, we have 
seen data leaks involving the breach of more sensitive information, 
including credit card numbers and even Social Security numbers.  Facing 
the stark reality that these compromises are likely to continue and 
worsen, we must develop better tools for prevention (i.e., making it 
difficult for attackers to access data once they have compromised a 
system) and auditing (i.e., figuring out exactly what data has been 
breached, when, and by whom).</p><p>Here are some quick tips on what users can do to minimize the damage that a data breach can have on them.</p><p>1.
 Safeguard passwords for sites that hold a lot of your data.  In 
particular, do not use the same password for a site like Google as you 
may use for other sites.  This may at least reduce the risk that a 
breach of your password on another site would result in your password on
 a "higher value" site also being cracked.</p><p>2. Try not to store 
information related to your identity in these services.  Specifically, 
users might want to be particularly careful about documents that contain
 Social Security numbers, birthdates, credit card numbers, passwords to 
other accounts (such as bank accounts), and other information.</p><p>3. 
Be aware of phishing attacks, and pay particular attention to any 
request to "reset" your password on a high-value site.  These sites, as a
 general rule, will never send you a link by email asking you to enter 
your password. Pay particularly close attention to any message that 
comes via email asking you to click on a link where you are asked to 
enter a password.</p><p>4. Be on the lookout for suspicious login 
activity patterns to your account.  Sites such as Google provide 
information about where on the network your account was last accessed 
from (there is typically a link at the bottom of the website for this). 
 You might want to periodically check this information, to make sure 
that you recognize the places where your account has been accessed.</p><p>5.
 Take note of what sensitive data you may have stored in these services.
  If a data breach occurs, you will want to assess the worst-case 
scenario and take measures to protect yourself from fraud or identity 
theft.  (For example, if you did have any documents with addresses, 
birthdates or sensitive information stored in these services, you may be
 more vulnerable to identity theft.)</p><p>In addition to things that 
users can do, there is also a serious need for more extensive protection
 against data leaks in the enterprise space.  Software will continue to 
be vulnerable, and there will be users who will inevitably not take 
these recommendations.  We do need better mechanisms to provide 
safeguards against these types of breaches in the event that a 
compromise does occur. </p><p>This is an active area of research in my 
group here at the Georgia Tech Information Security Center where we are 
developing various technologies to combat data leak threats.</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2011-04-08T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Nick Feamster offers his expertise on the Epsilon data breach and what users and custodians can do to protect their data.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Nick Feamster, of the Georgia Tech Information Security Center in the College of Computing, offers his expertise on the Epsilon data breach and what users and custodians can do to protect their data.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="65456">
            <nid>65456</nid>
            <type>image</type>
            <title><![CDATA[Nick Feamster]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>193222</fid>
                  <filename><![CDATA[091201R007_0.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/091201R007_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/091201R007_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Nick Feamster]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[david.terraso@comm.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p><strong>Georgia Tech Media Relations</strong><br />Laura Diamond<br /><a href="mailto:laura.diamond@comm.gatech.edu">laura.diamond@comm.gatech.edu</a><br />404-894-6016<br />Jason Maderer<br /><a href="mailto:maderer@gatech.edu">maderer@gatech.edu</a><br />404-660-2926</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1183</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1183</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Home]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>654</tid>
        <value><![CDATA[College of Computing]]></value>
      </item>
          <item>
        <tid>9223</tid>
        <value><![CDATA[computer security]]></value>
      </item>
          <item>
        <tid>12709</tid>
        <value><![CDATA[epsilon]]></value>
      </item>
          <item>
        <tid>10567</tid>
        <value><![CDATA[Georgia Tech Information Security Center]]></value>
      </item>
          <item>
        <tid>2254</tid>
        <value><![CDATA[gtisc]]></value>
      </item>
          <item>
        <tid>10637</tid>
        <value><![CDATA[nick feamster]]></value>
      </item>
          <item>
        <tid>166941</tid>
        <value><![CDATA[School of Computer Science]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
