{"id":576,"date":"2011-07-29T15:37:07","date_gmt":"2011-07-29T19:37:07","guid":{"rendered":"http:\/\/techtonictimes.com\/?p=576"},"modified":"2014-12-03T10:45:11","modified_gmt":"2014-12-03T10:45:11","slug":"security-breach","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/","title":{"rendered":"Security Breach? Go Ahead, Infect Me."},"content":{"rendered":"<p><strong><a href=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy2.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-652 size-full\" title=\"apathy\" src=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy2.jpg\" alt=\"Security Breach\" width=\"320\" height=\"250\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy2.jpg 320w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy2-300x234.jpg 300w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/a>&#8220;Microbicide research is developing a new method of HIV prevention that will allow individuals to apply a gel, cream, or film prior to sexual activity.&#8221;<\/strong><\/p>\n<p style=\"text-align: justify;\">An <a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/hackers-wear-manolos-too\/\" target=\"_blank\">earlier post<\/a> highlighted the hackers pick for 2011 to date, with the Citigroup data breach taking the top spot.<\/p>\n<p style=\"text-align: justify;\">I am sure the officials at Citibank would have preferred to be number one on another type of list; unfortunately, we don&#8217;t get to choose our poison or how we are going to die.<\/p>\n<p style=\"text-align: justify;\">Unless, of course, you have contracted\u00a0 HIV, the\u00a0 virus that causes AIDS.<\/p>\n<p style=\"text-align: justify;\">Well, sort of.<\/p>\n<p style=\"text-align: justify;\">If you&#8217;re old enough, you may recall the worry that stalked every nook and cranny of our existence while anxiety and fear hung like smog\u00a0 at the thought of even sharing the same breathing space with someone we <em>think<\/em> could be a carrier.<\/p>\n<p style=\"text-align: justify;\">Back then, we didn&#8217;t need confirmation that someone had the virus; a rumor was enough for us to run like hell.<\/p>\n<p style=\"text-align: justify;\">Or, we would carefully and and creatively ostracized &#8216;those&#8217; people.<\/p>\n<p style=\"text-align: justify;\">Fast forward.<\/p>\n<p style=\"text-align: justify;\">Today, we date and even marry people we know are infected.<\/p>\n<p style=\"text-align: justify;\">Do you sense that the same twisted reality is seeping into our consciousness as it relates to the theft of our <strong>Personal Identifiable Information (PII)?<\/strong><\/p>\n<p style=\"text-align: justify;\">The unspoken acceptance that it is permissible to compromise our\u00a0 right to privacy and security? Those rights for which our founding fathers risked their lives?<\/p>\n<p style=\"text-align: justify;\">The idea that our <strong>social security numbers<\/strong>, <strong>bank account access<\/strong>, <strong>date of birth<\/strong> and our legacy is up for grabs and that we should just accept it as part of our new reality?<\/p>\n<p style=\"text-align: justify;\">Are we tethering on the brink of\u00a0 &#8220;if you can&#8217;t beat &#8217;em, join &#8217;em?&#8221;<\/p>\n<p style=\"text-align: justify;\">Or worse. Do nothing?<\/p>\n<p style=\"text-align: justify;\">The measure of\u00a0 whether most people have accepted this new reality may not have been developed yet, but recently I interviewed an <strong>Information Security Officer<\/strong>, a Federal Government employee, and he quickly agreed.\u00a0 From his perspective, security breaches have taken on <em>shades of severit<\/em>y.<\/p>\n<p>Shades of severity is the unspoken acceptance of the compromise that I referred to earlier that responds only if a <strong>security breach<\/strong> is a matter of life and death.<\/p>\n<p style=\"text-align: justify;\">Sobered by his candor, I considered the numbers:<\/p>\n<ul style=\"text-align: justify;\">\n<li>\n\u00a0Symantec sees nearly 2 million threats every day\n<\/li>\n<li>\nMcAfee generates 55,000 unique signatures every day, and estimates there are 2 million malicious web sites appearing every month\n<\/li>\n<li>\nSophos recieves 95,000 malware samples everyday, and detected\u00a0 100,000 new fake antivirus products just in December alone<strong>.<br \/>\n<\/strong>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">In this age of terrorism, it may be that many <strong>Information Security Officers<\/strong> are intimidated and dwarfed by the <strong>terror cells<\/strong> that lurk in <strong>Cyberspace<\/strong> to undermine their efforts to protect the infrastructure and are sipping\u00a0 cups of\u00a0 apathy sweetened with &#8220;don&#8217;t care.&#8221;<\/p>\n<p style=\"text-align: justify;\">What do you think?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shades of severity is the unspoken acceptance of the compromise that I referred to earlier that responds only if a security breach is a matter of life and death.<\/p>\n","protected":false},"author":2,"featured_media":648,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[18,25,49,51,80,96],"class_list":["post-576","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-security","tag-aids","tag-breach","tag-hiv-virus","tag-information-security-officers","tag-personal-identifiable-information","tag-symantec"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Breach, Security Officers And Complacency<\/title>\n<meta name=\"description\" content=\"A Security breach erodes confidence and the security Infrastructure is further endangered by the psychological inertia and mental defeat of Information Security officers\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Breach, Security Officers And Complacency\" \/>\n<meta property=\"og:description\" content=\"A Security breach erodes confidence and the security Infrastructure is further endangered by the psychological inertia and mental defeat of Information Security officers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2011-07-29T19:37:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-12-03T10:45:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"320\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Security Breach? Go Ahead, Infect Me.\",\"datePublished\":\"2011-07-29T19:37:07+00:00\",\"dateModified\":\"2014-12-03T10:45:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/\"},\"wordCount\":459,\"commentCount\":2,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg\",\"keywords\":[\"AIDs\",\"breach\",\"HIV virus\",\"Information Security Officers\",\"Personal Identifiable information\",\"Symantec\"],\"articleSection\":[\"Data Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/\",\"name\":\"Security Breach, Security Officers And Complacency\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg\",\"datePublished\":\"2011-07-29T19:37:07+00:00\",\"dateModified\":\"2014-12-03T10:45:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"A Security breach erodes confidence and the security Infrastructure is further endangered by the psychological inertia and mental defeat of Information Security officers\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg\",\"width\":320,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Breach? Go Ahead, Infect Me.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Breach, Security Officers And Complacency","description":"A Security breach erodes confidence and the security Infrastructure is further endangered by the psychological inertia and mental defeat of Information Security officers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/","og_locale":"en_US","og_type":"article","og_title":"Security Breach, Security Officers And Complacency","og_description":"A Security breach erodes confidence and the security Infrastructure is further endangered by the psychological inertia and mental defeat of Information Security officers","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/","og_site_name":"TechTonic Times","article_published_time":"2011-07-29T19:37:07+00:00","article_modified_time":"2014-12-03T10:45:11+00:00","og_image":[{"width":320,"height":250,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Security Breach? Go Ahead, Infect Me.","datePublished":"2011-07-29T19:37:07+00:00","dateModified":"2014-12-03T10:45:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/"},"wordCount":459,"commentCount":2,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg","keywords":["AIDs","breach","HIV virus","Information Security Officers","Personal Identifiable information","Symantec"],"articleSection":["Data Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/","name":"Security Breach, Security Officers And Complacency","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg","datePublished":"2011-07-29T19:37:07+00:00","dateModified":"2014-12-03T10:45:11+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"A Security breach erodes confidence and the security Infrastructure is further endangered by the psychological inertia and mental defeat of Information Security officers","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/apathy.jpg","width":320,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Breach? Go Ahead, Infect Me."}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=576"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/576\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/648"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}