Goto Blog Home PageRevell Research Systems: Alastair Revell's Web Log
On this page....
Archive
<2017 May>
SunMonTueWedThuFriSat
30123456
78910111213
14151617181920
21222324252627
28293031123
45678910

RSS 2.0     Atom 1.0     CDF

Summary
Search
Navigation
Categories
Blog Roll
About Alastair Revell
Alastair Revell is the Managing Consultant of Revell Research Systems, a Management and Technology Consulting Practice based at Exeter in the United Kingdom.
Contact Alastair Revell
 EMail Revell Research Systems Limited Email Me
Copyright
Legal & Other Notices
Sign In
Disclaimer
The material published in this web log is for general purposes only. It does not constitute nor is it intended to represent professional advice. You should always seek specific professional advice in relation to particular issues. The information in this web log is provided "as is" with no warranties and confers no rights. The opinions expressed herein are my own personal opinions.

Web Log Home | Welcome to this Web Log | Using this Web Log | New to Blogs? | About Revell Research Systems | Contact Details

Review Entries for Day Wednesday, 27 January 2010

I suspect many businesses and probably most members of the general public are unaware that the fees for notification under the Data Protection Act 1998 were changed with effect from 1st October 2009. The change was made through The Data Protection (Notification and Notification Fees) (Amendment) Regulations 2009 Statutory Instrument 2009/1677 laid before Parliament by Michael Willis, Minister of State in the Ministry of Justice, on 6th July 2009.

The annual notification fee has been £35 for all data controllers, regardless of their size, since 2000. However, from 1st October 2009, two-tiers of fees have been in force.
 
Essentially, small and medium sized-organisations with fewer than 250 employees or less than £25.9M turnover continue to pay £35 annually and are now defined as “Tier 1” organisations. All other bodies (including any public authorities defined in the 1998 act) will now fall into “Tier 2” and must pay £500 annually.
 
I think the general public have come to realise over the last couple of years just how important their data is and how easily it can be lost by cavalier organisations (including government departments!)
 
I welcome the change in the fee structure provided the extra funds taken are used to increase the Information Commissioner’s capability to ensure all of our private data is kept more securely by those with whom it is entrusted and that those who flagrantly breach the rules are brought to task.
 
Many businesses see the current fee as a stealth tax and I suspect a good number of the general public too. However, I hope with the increased funding that the Information Commissioner will be seen to be doing more to actively protect the public from cavalier data controllers by everybody.
 
These fee increases have been introduced ahead of new powers that will come into effect in April 2010 that will allow the Information Commissioner to fine people and organisations that recklessly breach any of the eight principles that underpin the act.
 
These new powers were introduced as part of the Criminal Justice and Immigration Act 2008, but will only come into force in April 2010.  The Information Commissioner will only be able to fine data controllers when one or more of the eight principles have been seriously breached in cases where the breach was deliberate, or where the controller knew (or ought to have known) that the risk of such a breach was likely to cause substantial damage or distress; and the controller failed to take action to stop it.
 
Hopefully, these new teeth will work in tandem with the new funding to ensure all of our personal data is kept much more safely.
More about Alastair Revell

Wednesday, 27 January 2010 16:21:41 (GMT Standard Time, UTC+00:00)  #
Comments [0] General | Trackback

Review Entries for Day Wednesday, 20 January 2010

Just a quick update to my earlier blog regarding the problems currently being faced by the University of Exeter. It seems the virus is exploiting known flaws in the Microsoft Vista and Microsoft Server 2008 platforms.

Zack Whittacker, who blogs for ZDNet, has a source inside the university here in Exeter. Apparently, the virus is mainly targeting Vista SP2 machines and the IT staff at the university are trying to use patch MS09-050 to reduce the attack surface.

It is understood that this virus has not been seen outside of the Exeter campus, but clearly demonstrates the disruption that a carefully crafted attack can cause.

There is a suggestion in Whittacker's blog that some critical patches had not been applied (using the Microsoft System Update Service).

We strongly believe that machines should regularly be checked to ensure that patches that should have been applied, actually have been applied. If the loop is not closed in this manner then these sorts of problems are eventually inevitable.

We are concerned that many SMEs, who often do not patch properly, may be at considerable risk if this virus escapes the Exeter campus.

In addition, I remain concerned about the zero-day virus threat. A virus that spreads quickly and easily such as this one, that exploits a flaw such as the one in Internet Explorer that saw Google hacked in China, with a drive-by infection capability on a site such as any of the international versions of Google would lead to huge economic disruption across the globe.

For starters, many people set Google as their home page, so in this apocalyptic scenario, they would be infected and spreading such a virus internally inside the organisational firewall without detection or defence the moment they went online...

More about Alastair Revell

Wednesday, 20 January 2010 21:11:14 (GMT Standard Time, UTC+00:00)  #
Comments [0] Security | Trackback

It seems that the University of Exeter is currently in the middle of a major virus outbreak, which has led to their IT team shutting down the entire campus network, including their telephone system in an attempt to contain the problem.

The attack appears to have started on Monday. The campus network was shutdown at around 2:00pm as a direct response to the threat. However, the problems seem to be continuing today (Wednesday).

The university’s home page suggests that staff and students are only able to access email externally using home computers and the like.

The communications advice issued by the university says that it “is currently experiencing a severe IT incident, and as a precautionary measure we’ve taken much of our network offline. Parts of the University are being brought back online today as soon as it is safe to do so. The University switchboard is online and can accept calls, but we are unable to transfer them to some affected areas of the University.”

Sources in Exeter suggest that the virus has not been identified, but it is thought that the university was deliberately targeted. Stuart Franklin, a spokesman for the university, speaking to the local evening paper, the Express & Echo, said: “We were attacked by a virus. It was a malicious attack. It is the first time I have known such an attack to succeed.”

It seems clear that this virus is extremely virulent and has managed to spread quickly and easily. This strongly suggests that it managed to circumvent the university’s antivirus systems and may have been akin to a zero-day virus.

Although a difficult decision, I believe that closing down the infrastructure in such circumstances is the right thing to do.

This incident should provide food for thought for many organisations. The cost of closing down a network is extremely expensive in terms of lost revenue and opportunities, even before the sheer amount of professional time spent checking systems and returning them to service is taken into consideration.

In fact, this sort of attack can cause immense damage to an organisation and is relatively easy to perpetrate, which has not escaped the notice of Lloyd’s of London Emerging Risks Team in their October 2009 report: ‘Digital Risks: Views of a Changing Risk Landscape’. The report states that “The value of data can vary enormously, but for some organisations it could mean bankruptcy.”

The interesting aspect to this attack is that the university believes it was “hit by the virus deliberately”.

I think we may see an increase in this sort of attack in the future. The recession has been very deep and many people with criminal intent and technical capability across the world may turn to cyber-crime.

In the first two weeks of January, we’ve seen the national governments of France and Germany warn their citizens about security flaws in Internet Explorer after an attack on Google’s site in China (along with some 20 other organisations), which Microsoft admitted late last week were part of the attack mechanism. The code that exploits these particular flaws were published on Monday, 18th January 2010 and there are already some reports of it being used maliciously.

Although the problems at the University of Exeter and the issues with Internet Explorer are probably not connected, the trend for increased, malicious attacks is clear. 

More about Alastair Revell

Wednesday, 20 January 2010 17:02:17 (GMT Standard Time, UTC+00:00)  #
Comments [0] Security | Trackback

RSS 2.0 Feed If you enjoyed reading an article on this blog, why not subscribe to the RSS 2.0 feed to receive future articles?
   
Revell Research Systems Logo Visit the Revell Research Systems Web Site if you want to learn more about this management and technology consulting practice.