NY requires businesses to disclose security breaches.



The Register writes that New York has passed a law that will require local government agencies and businesses to disclose security breaches. (System broken into or data stolen). I can understand businesses being reluctant to disclose this kind of information. “What will they say about us”, “bad reputation”, “we’ll lose customers”, the thoughts could go on. However, there are some people that respect a business that is up front about a problem like this.



I was impressed with Verizon’s confirmation of a problem and fairly quick resolution of a few more issues they found in yesterdays report on verizon wireless web page vulnerabilities. I guess the way I see it “to err is human”, in this case to be stand up, acknowledge it realistically and fix it is what approaches divine. We will never have perfect software. Bugs are guaranteed, but everyone affected needs to be “in the loop” when a major problem occurs. That’s what this law seems to work towards.

California has had similar measures for 2 years and another 15 states have done likewise. In this day and time information is truly power. Businesses disclosing information about breaches and compromised data gives the information and ultimately the power to decide how to deal with it to those affected.

Related Posts

Blog Traffic Exchange Related Posts
  • Google cache revealing critical personal infromation A while back I did an article on using Google search in some slightly more advanced ways, as well as a link to a site of specific Google searches. I've come across something in the Handlers diary at Incidents.org that is worth knowing about. The entry in question details that......
  • Network Security - Arp spoofing So.... what is arp spoofing (poisoning).... and what are it's implications? ARP spoofing involves tricking a machine into thinking that you're machine is, yet another. Let's put this in IP address terms. Let's say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are......
  • Cyberextortion The New York Times online has an article on the rise of Cyberextortion. Businesses are usually targetted. That was true in the case of the focus of this article. Apparently the person in question used stolen Internet account information and "pirated wireless access" *(unsecured, open access points?), to threaten the......
Blog Traffic Exchange Related Websites
  • easy ways to make money - The Information You Must Learn Being successful in making money online is the dream of many people who look for ways to work from home. Having some basic knowledge on making money online can make it possible for you to succeed in this business. The most important thing is to know where to begin. You......
  • U.S. Government Offers Assistance to Lockheed Martin After Security Breach News on Twitter buzzed recently as security professionals and hackers alike shared information pertaining to a network breach of top U.S. weapons manufacturer Lockheed Martin.  Initially it was not immediately clear if any sensitive information was stolen or compromised, but late Saturday evening,Reuters and MSNBC reported “Lockheed Martin Corp., the......
  • Enhancing your Business with Blogging Blogging has become an extremely popular activity for businesses, and it also has created a very important impact in other circles as well, including an activity for the political scene as well as for ordinary individuals as well. Google purchased Blogger in 2003, and ever since, blogging has continued to......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site