What Ashley Madison Teaches Us About Cybersecurity

What Ashley Madison Teaches Us About Cybersecurity

For 37 million adulterers, this was a very bad week. Ashley Madison, a website catering to those seeking extramarital affairs, had its database of users hacked.

Putting aside the ethical and moral issues surrounding Ashley Madison, this event gives us an opportunity to analyze the current state of cybersecurity. What makes this case noteworthy are the following:

  1. The attack was ideological in nature, as opposed to most other hacks which are directed to either cause mischief and disruption, or to obtain credit card and other sensitive data.
  2. Customers were misled into believing their data was not only secure, but destroyed on demand. Ashley Madison offers a $19 “permanent account deletion” service.
  3. This is effectively a ransom case. The hackers, “Impact Team”, threatened to leak customer data to the public if the Toronto-based ALM (Ashley Madison’s parent company) didn’t shut down the site.

No system is unhackable. So, as an executive of a business managing customer data, how can you mitigate the risk of devastating compromises such as this? Here are a few thoughts:

  1. Hire an information security consultant to train you up to competence.
  2. Get your staff trained on security best practices. This includes social engineering threats and basic user awareness.
  3. Work with a Red Team to perform penetration testing and risk analysis.
  4. Create honeypots in your infrastructure to gather data that can help you model your attack surface.
  5. Firewalls and intrusion detection systems are insufficient; application code is highly vulnerable. Have your codebase regularly reviewed by a professional for vulnerabilities.

You Can’t Overinvest in Security

Seriously consider your return on security investment (ROSI), especially if you accept credit card payments, or retain any Personally Identifiable Information (PII). A meaningful investment in your cybersecurity strategy will net you the following results:

  1. Dramatically improved ability to prevent malicious activity
  2. Minimized window of incident detection to remediation
  3. Improved security data leading to better decision making
  4. Increased compliance efficiency, especially when dealing with auditors
  5. Fewer compromised assets
  6. Increased brand repute and customer loyalty

I often work with clients to develop these cybersecurity strategies, assist with regulatory compliance, and perform security audits.

How are you exposed?

Comments

AWS migration and transformation programs reduce cost, risk, and complexity for rapid business innovation and agility at scale. I offer a number of AWS consulting services, including an AWS migration service to quickly get you up and running. Please contact me for details on how I can help your organization.