Because user credentials were misused, the Sony breach is similar to the dozens of other recent breaches, from Target to Home Depot to JP Morgan, says Linda S. Millis, a security analyst with government and civilian credentials
Reports surrounding the Sony data breach are missing a simple, critical concept, says Linda S. Millis.
"Lost, stolen or sold credentials caused each breach. Servers respond to authorized credentials – even if they're lost, stolen or sold. The servers aren't being hacked – the credentials are misappropriated," Millis says.
"We've been told all year long by cybersecurity experts that data breaches like the ones we've seen this year are inevitable. Not so," says Millis, who has more than two decades of security analysis service at the National Security Agency, the CIA, the Office of the Director of National Intelligence and the White House.
"Not surprisingly to us, reports from CNN and others say the breach has been tracked to a Sony administrative credentials lapse," says Millis. "These breaches can and should be stopped before they happen by shutting the front door to the server and preserving the privacy of everyone concerned.
It should be clear to everyone that the steps being taken to prevent cybercrime are not working, so new and innovative solutions are needed in prevention – not only detection and response."
She says companies and governments don't have to be subject to the type of blackmail and extortion exhibited in the Sony case because credentials can be protected.