{"id":1,"date":"2015-02-03T12:08:44","date_gmt":"2015-02-03T12:08:44","guid":{"rendered":"http:\/\/swivelsecure.com\/?p=1"},"modified":"2019-01-22T10:51:24","modified_gmt":"2019-01-22T10:51:24","slug":"us-cybersecurity-legislation-better-late-than-never","status":"publish","type":"post","link":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/","title":{"rendered":"US Cybersecurity legislation \u2013 better late than never!"},"content":{"rendered":"<p>Last week US Congress began the process of making President Obama\u2019s State of the Union address, where he focused on ways to secure the nation\u2019s businesses and infrastructure in cyberspace, a reality.<\/p>\n<p>On Wednesday two House members reintroduced a bill requiring companies to meet a specific set of data security standards when handling customers\u2019 personal information.<\/p>\n<p>In the past, versions of the bill \u2014 known as Data Accountability and Trust Act (DATA) \u2014 have been introduced several times, with one measure approved in 2009. No versions of the bill have ever become law, however, and in 2014, renewed efforts to push it through the House went nowhere.<\/p>\n<p>The current proposal would deputize the Federal Trade Commission (FTC) to set nationwide data security standards for companies handling sensitive data, such as full names, Social Security numbers, ID information and credit card information. If this information was exposed by hackers, companies would have to notify the customers and the FTC. They could also face civil penalties of up to $5 million if they hadn\u2019t adhered to the commission\u2019s security standards.<\/p>\n<p>Despite mounting pressure on Congress to pass the bill following high-profile cyberattacks on major companies like Target, Home Depot and JPMorgan, US businesses still need to take voluntary action to protect themselves; legislation alone will not solve the problem.<\/p>\n<p><strong>Stand up and be counted, or face punishment<\/strong><br \/>\nFor too long many of these organizations have not publicly communicated with their customers. They choose not to tell them that their personal data has been stolen, instead letting the media break the story. Worse still, even when the media makes the world aware, they still maintain radio silence at a time when their customers are crying out for advice on how to limit the damage.<\/p>\n<p>Unfortunately, many customers of these organizations still don\u2019t know where and how their data is being used by hackers, resulting in some taking legal action, as has been seen with Target. However, while I sympathize with those affected by any data breach, legal action should be the last resort because protecting sensitive data should be a simple and cost effective task.<\/p>\n<p><strong>Convenience not ignorance<\/strong><br \/>\nThere\u2019s no doubt that our new hyper-connected world offers many benefits to businesses and consumers alike. But accessing data anywhere, anytime and on any device has weakened corporations IT security defences, and greatly contributed to the majority of the data breaches we\u2019ve seen in the past few years.<\/p>\n<p>The simple fact is that anyone using a personal wireless device to access corporate data represents a security risk, given the high-level of user-convenience and low-level of security afforded by these devices. And if you factor in that many of the IT security guys within these companies feel that their advice is being ignored, you\u2019ve got the perfect conditions for a data breach.<\/p>\n<p>Unfortunately this culture of convenience has led to widespread ignorance in terms of corporate data security. This, in part, has been driven from the top, with security policies being formulated around the CEO, or key executives, who want to be able to access a whole range of corporate data from their own personal devices. Sadly, even in light of the recent data breaches, there are many executives out there who still don\u2019t understand this risk.<\/p>\n<p><strong>Collaboration is key<\/strong><br \/>\nAlthough I\u2019m in favour of the DATA proposal, I hope that any legislation will take into account the role \u2018human error\u2019 can play in some data breaches; I truly don\u2019t want to see businesses who\u2019ve put the right protocols in place, being unfairly punished when they\u2019ve been hacked.<\/p>\n<p>Also, this legislation shouldn\u2019t be used as a stick by IT departments to lock down data on a massive scale, especially denying remote and mobile access. Realistically, all departments \u2013 ranging from IT to HR \u2013 as well as external vendors need to work together to agree to a security policy which delivers the most effective working environment possible.<\/p>\n<p>At the same time, all employees, from the board down, must accept that if they want the freedoms and benefits of working from home, or accessing email remotely on their own device, their access must and will be predicated by some degree of secure authentication, which in today\u2019s world, must go beyond a username and password approach.<\/p>\n<p><strong>Security is all about the long game<\/strong><br \/>\nWhile some cynics may claim the DATA proposal is somewhat knee-jerk, the reality is the threat that hackers pose to consumers, corporations and governments is not one that can be dealt with easily or quickly. And it\u2019s this realisation that every one of us needs to take into account to ensure we operate happily and securely in this digital age.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week US Congress began the process of making President &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-1","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.1 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>US Cybersecurity legislation<\/title>\n<meta name=\"description\" content=\"Accessing data anywhere, anytime and on any device has weakened corporations IT security defences. Here is the US Government&#039;s approach to secure the nation&#039;s business and infrastructure.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"US Cybersecurity legislation \u2013 better late than never!\" \/>\n<meta property=\"og:description\" content=\"Accessing data anywhere, anytime and on any device has weakened corporations IT security defences. Here is the US Government&#039;s approach to secure the nation&#039;s business and infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/\" \/>\n<meta property=\"og:site_name\" content=\"Swivel Secure Russian\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-03T12:08:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-22T10:51:24+00:00\" \/>\n<meta name=\"author\" content=\"Victoria Laws\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victoria Laws\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/\",\"url\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/\",\"name\":\"US Cybersecurity legislation\",\"isPartOf\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/#website\"},\"datePublished\":\"2015-02-03T12:08:44+00:00\",\"dateModified\":\"2019-01-22T10:51:24+00:00\",\"author\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\"},\"description\":\"Accessing data anywhere, anytime and on any device has weakened corporations IT security defences. Here is the US Government's approach to secure the nation's business and infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swivelsecure.com\/ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"US Cybersecurity legislation \u2013 better late than never!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/#website\",\"url\":\"https:\/\/swivelsecure.com\/ru\/\",\"name\":\"Swivel Secure Russian\",\"description\":\"Protecting Identities with Intelligent Authentication\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swivelsecure.com\/ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\",\"name\":\"Victoria Laws\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"caption\":\"Victoria Laws\"},\"url\":\"https:\/\/swivelsecure.com\/ru\/blog\/author\/v-laws\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"US Cybersecurity legislation","description":"Accessing data anywhere, anytime and on any device has weakened corporations IT security defences. Here is the US Government's approach to secure the nation's business and infrastructure.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"US Cybersecurity legislation \u2013 better late than never!","og_description":"Accessing data anywhere, anytime and on any device has weakened corporations IT security defences. Here is the US Government's approach to secure the nation's business and infrastructure.","og_url":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/","og_site_name":"Swivel Secure Russian","article_published_time":"2015-02-03T12:08:44+00:00","article_modified_time":"2019-01-22T10:51:24+00:00","author":"Victoria Laws","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Victoria Laws","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/","url":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/","name":"US Cybersecurity legislation","isPartOf":{"@id":"https:\/\/swivelsecure.com\/ru\/#website"},"datePublished":"2015-02-03T12:08:44+00:00","dateModified":"2019-01-22T10:51:24+00:00","author":{"@id":"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514"},"description":"Accessing data anywhere, anytime and on any device has weakened corporations IT security defences. Here is the US Government's approach to secure the nation's business and infrastructure.","breadcrumb":{"@id":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/swivelsecure.com\/ru\/blog\/2015\/02\/03\/us-cybersecurity-legislation-better-late-than-never\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swivelsecure.com\/ru\/"},{"@type":"ListItem","position":2,"name":"US Cybersecurity legislation \u2013 better late than never!"}]},{"@type":"WebSite","@id":"https:\/\/swivelsecure.com\/ru\/#website","url":"https:\/\/swivelsecure.com\/ru\/","name":"Swivel Secure Russian","description":"Protecting Identities with Intelligent Authentication","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swivelsecure.com\/ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514","name":"Victoria Laws","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swivelsecure.com\/ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","caption":"Victoria Laws"},"url":"https:\/\/swivelsecure.com\/ru\/blog\/author\/v-laws\/"}]}},"_links":{"self":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":0,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"wp:attachment":[{"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swivelsecure.com\/ru\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}