{"id":179329,"date":"2018-03-26T06:43:00","date_gmt":"2018-03-26T11:43:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/semper-fi-never-negotiate-with-cyberterrorists\/"},"modified":"2018-03-26T06:43:00","modified_gmt":"2018-03-26T11:43:00","slug":"semper-fi-never-negotiate-with-cyberterrorists","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/semper-fi-never-negotiate-with-cyberterrorists\/","title":{"rendered":"Semper Fi: Never Negotiate With Cyberterrorists"},"content":{"rendered":"

A recent report by the U.S. Marine Corps indicates an unintended data disclosure<\/a>, the result of a single accidental keystroke. Never backing down from a fight, learn from Jarheads how to best defend yourself from a data breach and strengthen your position!<\/em><\/p>\n

\"US<\/p>\n

Have you ever thought twice about clicking \u201csend\u201d after drafting an email? We\u2019re sure you have; everyone has. The most common reasons involve editing the text for clarity, context, or tone. Sometimes you verify the email addresses for the \u201cto\u201d field. These are all great measures that everyone can \u2014 and should \u2014 take before sending an email, especially one with sensitive data enclosed.<\/p>\n

Yet, accidents happen. A recent accidental keystroke shared an email to an incorrect distribution list, which included the unencrypted personal data of more than 20,000 U.S. Marines, their families, and civilians. Social security numbers, bank details, credit card information, home and mailing addresses, and emergency contact information were all disclosed. Does this fall under the label of \u201cdata breach\u201d if the disclosure was part of an \u201coops\u201d and not a cyber attack?<\/p>\n

Marine Forces Reserve spokesperson Andrew Aranda has said<\/a> the Marines\u2019 IT staff is reviewing cybersecurity and information assurance processes to update their overall guidelines and to better train team members at every level. More importantly, this was an accident without malicious intent, and a cybersecurity vulnerability was not the cause. Additionally, the United States Armed Forces branches fully understand the great responsibility to protect highly-confidential personally identifiable information (PII) stored in their records and a lengthy history of excellence in this arena.<\/p>\n

More than 20,000 individuals will now need to diligently check their credit report on a regular basis to ensure this disclosure doesn\u2019t leave them open to identity theft. Add to this number the family members potentially impacted, and the full amount affected could double or triple. This is a story too well-known by millions of Americans in recent years. Customers of Anthem, Target, eBay, and The Home Depot are just a few examples of organizations whose customers have been impacted by data breaches. Cybercriminals and cyberterrorists \u2014 hackers \u2014 are just waiting for a weakness to exploit. This introduces two key questions:<\/p>\n