The Fundamentals of Data Security

    Josh Siegel

    Software and systems that do not adhere to best practices for data privacy and security are at risk of data breaches and security instances that may give rise to litigation.

    Data privacy and security disputes often involve allegations of failure to protect consumer data, to identify a data breach and alert customers, or to implement or maintain adequate data security measures. In this article, we discuss several data security best practices that can help prevent such disputes.

    Data Security Best Practices

    Data Security Best Practices

    DisputeSoft was engaged as software failure expert witnesses in a pre-litigation data security investigation by a financial management firm (referred to in this article as “Blue Ridge”) to assess the firm’s endpoint and domain name system (DNS) resolution protection software to determine whether existing protective measures were sufficient to prevent users from accessing prohibited websites and software. As part of our investigation in this software failure case study, DisputeSoft reviewed the DNS protection software for security flaws and made a number of recommendations to the financial management firm’s systems administrator.

    We’ve drawn on industry best practices and our experience in the Blue Ridge matter to produce the below list of measures a company can take to assess the state of its data security practices. This list is not exhaustive, but could serve as a starting point for assessing and mitigating security vulnerabilities.

    1. Configure Firewall Protection

    A firewall is the first line of defense against attempted attacks and security breaches. It sits between the internet and a company’s internal network, and serves as a gatekeeper to filter out unwanted internet traffic and only allow approved activity through. Firewalls can protect against port-specific vulnerability attacks, such as Denial of Service attacks. There are many different types of firewalls of differing degrees of sophistication, but having a firewall is necessary to block traffic from the most common threats to data security.[1]

    2. Configure Anti-Virus and/or Endpoint Security

    If the firewall is the gatekeeper for the base, then antivirus and endpoint security software are the foot soldiers that help keep users and computers safe.

    Regular updates and scans with AntiVirus and Endpoint Security software help to defend computers from viruses, secure local computer and device configurations, and isolate and remove infections if they do occur.

    These security software can help block potential threats, sometimes as they are downloaded, and prevent them from running at all.

    3. Maintain and Electronically Enforce a Written Security Policy

    A written security policy can discourage employees from misusing company resources, make them aware of the consequences, and help them consider situations they may not have anticipated. However, written policies are generally only as strong as the means of enforcement, and thus a strong written policy should also be enforced electronically when possible. For example, the risk of data loss can be minimized by classifying data according to its confidentiality level, then limiting access to only staff who need access to that data. 

    Moreover, implementing strong group policy settings governing automatic lock screen timeouts and automatic patch and update management can help protect against unauthorized access and security vulnerabilities resulting from out-of-date software.

    For an extra level of protection, a company might encrypt its portable drives and devices, especially if they contain sensitive or confidential information. With a sufficient level of encryption, it is very difficult for a bad actor to recover data from a lost or stolen device.

    4. Configure Auditing and Alerting

    No one wants to experience a data breach or loss of data. However, businesses need to prepare for the possibility of a breach in advance by configuring systems to track what happened, when it occurred, and who penetrated the system.

    Audit logs can provide information that may be able to link activity occurring on a computer to a date, time, system, and user name. 

    Moreover, configuring alerts to notify an administrator when users act outside of allowed or preferred security policy can help identify breaches and potentially prevent loss of data before it occurs.

    Such alerts may include notifications that critical systems are performing outside of thresholds, or that a log-on has occurred outside of normal business hours.

    When a data breach can’t be stopped, a combination of audit logs and alert notifications can be used to reconstruct essential information about the breach.

    5. Implement DNS Protection and Web-Filtering

    Web-filtering options allow administrators to set lists or categories of allowed and blocked websites, while domain name system (DNS) settings on a user’s computer control what websites to allow or block.

    Certain firewalls may include both DNS Protection and Web filtering, but they can also be implemented using separate systems.

    DNS protection helps ensure that a user is not able to change or circumvent settings to access prohibited websites from within a company’s network. Accessing prohibited sites containing viruses can lead to data breaches or potential data loss, such as in the case of a ransomware.

    This was of particular importance in the Blue Ridge case, as the reason for the audit was an employee looking at dangerous websites from a work computer.

    6. Insurance

    While the above five best practices focus on the technical aspects of instituting data security, having an adequate insurance policy as an umbrella strategy can also be important as well.

    A data security incident with client and/or employee and corporate data compromised can expose a company to very significant financial penalties including legal costs. 

    Therefore, such an insurance policy will need to cover data and cyber security incidents and at coverage levels that adequately insulate against unnecessary company financial exposure.

    Our experience is that while such policies are not as commonly available or underwritten in volume compared to other more common forms of business insurance, it is important to perform one’s due diligence on such insurance policies and select one that offers the best tradeoff between risk exposure, coverage level, and premium level. 

    It is also our experience that insurance company teams are coming to grips with the fast changing world of data and cyber security, and as such there could be wide variations in qualification criteria for cyber and data security insurance.

    Insurance companies will however want to assess in their qualification process a company’s data security policies, procedures, and overall topic-area maturity as outlined in the above six best practices.

    Conclusion

    Conclusion

    Implementing data security best practices can help companies limit the risk of data breach litigation and government investigation.

    Our software experts work with a client’s IT department in assessing data security practices, and make specific recommendations for remediating system vulnerabilities.

    To learn more about our data privacy and security services in the context of pre-litigation, litigation, and government investigations, view our Data Privacy, Protection, and Security Services page.

    To learn more about the work we did in the “Blue Ridge” investigation, view the case write-up here: “Blue Ridge” Pre-Litigation Data Security Investigation.

    Other Insights from Josh Siegel

    Post The AFC test used by a software failure expert
    This second installment in DisputeSoft's Applying the AFC Test series considers the ability of the AFC Test to reveal hidden similarities in the structure, sequence, and organization of two programs.
    Case
    DisputeSoft was engaged by Ontario Systems in this software project failure dispute involving the licensing and implementation of accounts receivable management software.
    Post software experts on security
    Read Josh Siegel’s article on several measures a company can take to assess the state of its data security practices to help prevent data breaches and security instances.

    Josh Siegel

    Director & Forensic Examiner

    Josh Siegel has substantial experience analyzing copyright, patent, and trade secret claims related software and information technology. Josh performs functional testing, analyzes defect systems and metadata, examines source code in intellectual property disputes, acquires and analyzes data in digital forensics, and finally integrates that data into written reports and testimony.