[BreachExchange] Security Breached - Tips for Mitigating and Protecting Private Information from Inside and Outside Threats

Audrey McNeil audrey at riskbasedsecurity.com
Fri Mar 30 14:09:26 EDT 2018


https://www.lexology.com/library/detail.aspx?g=bd60ca75-f2c3-44d7-9598-
9bac3e9bb5da

If you’re going to demote or terminate your in-house tech expert, you
should plan that event very carefully.

Our firm is now helping a client with damage control and data recovery upon
discovering – a week after their former Chief Technology Officer (CTO) had
resigned but six months after he’d been demoted to a lesser role -- that
the CTO had created a back door for himself to the client’s servers and had
spent those last six months of his employment accessing, downloading and
storing emails of the client’s top executives, and its most important
vendors. These stolen emails contain personal financial information, such
as bank account numbers, personal health information, bank routing
information for personal accounts of the client’s top executives, including
the CEO and two board members. The former CTO also had accessed and
downloaded other proprietary corporate information, including bank routing
numbers for several of the client’s most important vendors, and other
private information. At a minimum, the executives and their vendors will
need to change their banking and other private, personal information, at
some if not significant expense, and no less heartache.

While you might think the Chief Technology Officer would have had such
access authorized, he did not. He most certainly exceeded his authorized
access, and did so without requesting or obtaining permission either from
the client, the executives, or the vendors. Additionally, as part of his
resignation, the client and the former CTO arranged a “consulting
agreement,” under the terms of which he was permitted to keep and use his
company-issued laptop.

After the new CTO discovered the unauthorized back door access channel, we
scrambled to draft and file a request for an emergency, ex-parte Temporary
Restraining Order against the former CTO from the nearest U.S. District
Court, for violations of the Computer Fraud and Abuse Act and the Defense
of Trade Secrets Act, and to secure the return of the company laptop.

The Court granted the emergency TRO, which is good for 14 days, and the
client has retrieved the laptop. However, the process server hired to
deliver the court papers to the former employee and to retrieve the laptop
was required to wait for 45 minutes while the former employee ”searched”
for it in his own home. While the process server waited, with the former
employee out of his eyesight, it is entirely possible this former CTO
deleted or attempted to delete compromising information still on the
laptop’s hard drive. The computer is now in the hands of a forensic
computer expert who can examine it thoroughly.

The point of this discussion is simple – we as employers ought to know by
now that our technology-savvy employees, especially our in-house technology
experts, are quite able to figure out ways to steal, use or corrupt our
electronic information. Rather than wait until after they’ve departed to
determine if they’ve done anything that can harm us or our other employees,
we should plan to conduct such an inquiry before we demote, re-assign,
otherwise discipline or terminate any employee. This is especially true for
those with the technical expertise to engage in electronic misconduct. That
way, if we find misconduct has occurred, we still have some control over
the employee and can diminish or negate the harm before the employee is
gone from our premises. It is a more timely and cost effective method of
protecting our, and our employees’, privacy and private information.

Access the employee’s desktop or laptop (or any other company-issued device
such as a tablet or smart phone) outside their presence, utilizing an
independent forensic expert to “image” the device’s hard drive, then
examine it. Be sure to maintain and record a clear chain of custody of the
device. If there is data on the device the employee should not have, you of
course can question them about it. If it looks like they’ve moved, copied,
or compromised data, your forensic expert should be able to tell you. If
they’ve corrupted data, you might be able to mitigate the damage while you
still have them in front of you, to be questioned. After they’re gone, your
only access to them may be a subpoena, or a lawsuit.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20180330/70c1c7ab/attachment.html>


More information about the BreachExchange mailing list