All the latest UK technology news, reviews and analysis


Nasa laptop containing sensitive data stolen

15 Nov 2012
Nasa International Space Station

Nasa has lost a laptop full of sensitive information, placing thousands of the space agency's employees and contractors at risk, according to reports.

The laptop was stolen from a Nasa worker's car and contains a slew of personal information, including employees' social security numbers, according to Reuters.

The theft is doubly dangerous as the information stored on the laptop is not encrypted, meaning the thief could easily access it.

Personal and financial information is a high value item on many cyber black markets, as it allows crooks to craft more complex and effective attacks.

Reuters reported that Nasa has already alerted its employees of the loss via a mass email.

"Information on the laptop could be accessible to unauthorised individuals," Nasa associate deputy administrator, Richard Keegan, was reported to have said.

"Because of the amount of information that must be reviewed and validated, it may take up to 60 days for all individuals impacted by this breach to be identified and contacted."

At the time of publishing Nasa had not responded to V3's request for comment on the theft, though Nasa has reportedly already begun investigating the loss by hiring several ID experts and data breach specialists.

The incident follows widespread reports of US government agencies failing to implement even basic cyber best practice policies to protect sensitive data.

Most recently staff at the US Securities and Exchange Commission (SEC) were reported to have put sensitive information from a number of stock exchanges at risk after using unencrypted computers for work purposes

The slew of reports has led experts in the security industry to call on US government agencies and businesses to take cyber security more seriously.

"By its own admission, only one percent of Nasa laptops and portable devices were encrypted as at February 2012, compared with a US government-wide encryption rate of 54 percent," said UK managing director for Check Point, Terry Greer-King.

"There's still a long way to go before the data held on government and corporate laptops is truly secure."

Vice president at Voltage Security, Mark Bower, added that encrypting information stored on a laptop was on the first of many measures businesses and governments need to take.

"CIOs need to remember that just encrypting a laptop solves only a fraction of data breach risk," said Bower.

"Data moves to and from laptops in emails, files, and as data to and from applications and servers. So while encrypting a laptop might be a first reaction, with attackers going after data in flight and the risk of accidental breach through multiple channels

"Wherever there's a security gap with data in the clear, it's vulnerable to compromise. It's important for CIOs to consider new and more effective ways of preventing breaches - for example, data-centric security."

The importance of encryption was also highlighted by the fact fines in the UK levied against public sector organisations for data breaches has passed £2m.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
21%
13%
4%
21%
30%
11%

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Lead .Net Developer – Document / Data Transformation

Lead .Net Developer – Document / Data Transformation...

SharePoint Developer

SharePoint Developer – Data Development £60,000...

BizTalk Developer

BizTalk Developer £65,000 + benefits / Luton...

Project Manager – Risk, Planning, Control and Stakeholder management

Project Manager – Risk, Planning, Control and Stakeholder...
To send to more than one email address, simply separate each address with a comma.