NY requires businesses to disclose security breaches.



The Register writes that New York has passed a law that will require local government agencies and businesses to disclose security breaches. (System broken into or data stolen). I can understand businesses being reluctant to disclose this kind of information. “What will they say about us”, “bad reputation”, “we’ll lose customers”, the thoughts could go on. However, there are some people that respect a business that is up front about a problem like this.



I was impressed with Verizon’s confirmation of a problem and fairly quick resolution of a few more issues they found in yesterdays report on verizon wireless web page vulnerabilities. I guess the way I see it “to err is human”, in this case to be stand up, acknowledge it realistically and fix it is what approaches divine. We will never have perfect software. Bugs are guaranteed, but everyone affected needs to be “in the loop” when a major problem occurs. That’s what this law seems to work towards.

California has had similar measures for 2 years and another 15 states have done likewise. In this day and time information is truly power. Businesses disclosing information about breaches and compromised data gives the information and ultimately the power to decide how to deal with it to those affected.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security - Arp spoofing So.... what is arp spoofing (poisoning).... and what are it's implications? ARP spoofing involves tricking a machine into thinking that you're machine is, yet another. Let's put this in IP address terms. Let's say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are......
  • Google cache revealing critical personal infromation A while back I did an article on using Google search in some slightly more advanced ways, as well as a link to a site of specific Google searches. I've come across something in the Handlers diary at Incidents.org that is worth knowing about. The entry in question details that......
  • Cyberextortion The New York Times online has an article on the rise of Cyberextortion. Businesses are usually targetted. That was true in the case of the focus of this article. Apparently the person in question used stolen Internet account information and "pirated wireless access" *(unsecured, open access points?), to threaten the......
Blog Traffic Exchange Related Websites
  • Organization Search Engine Optimization - Points You'll Need To Know In case you wish to entirely grasp company Search engine optimization requirements, you need to begin with being aware of what Search engine optimization is really. Which is the search engine optimization that's necessary for improving internet websites. This is one way of back-link developing to enhance your website position.......
  • Success Key No. 16: The Law of Constructive Action To get more, you must make constructive use of what you have.  You cannot use what you have not; therefore, your problem is how to make the most constructive use of what you already have.  Do not waste any time considering how you would use certain things if you......
  • U.S. Government Offers Assistance to Lockheed Martin After Security Breach News on Twitter buzzed recently as security professionals and hackers alike shared information pertaining to a network breach of top U.S. weapons manufacturer Lockheed Martin.  Initially it was not immediately clear if any sensitive information was stolen or compromised, but late Saturday evening,Reuters and MSNBC reported “Lockheed Martin Corp., the......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site