Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday October 10 2014, @11:49AM   Printer-friendly
from the do-you-feel-lucky-punk? dept.

Robert X. Cringely points out the hidden costs of running corporate IT over the public internet:

How cheap is IT, really, if it compromises customer data? Not cheap at all. Last year’s Target hack alone cost the company more than $1 billion, estimated Forrester Research. The comparably-sized Home Depot hack will probably cost about the same. JP Morgan Chase is likely to face even higher costs.

He wonders why companies aren't shifting to dedicated networks, like they used to make with leased lines.

Taking a bank or retail network back to circa 1989 would go a long way toward ending the current rash of data breaches. It would be expensive, sure, but not as expensive as losing all the money that Target and others have recently done.

Is this practical? If so, how would it be accomplished with modern equipment?

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Friday October 10 2014, @03:22PM

    by Anonymous Coward on Friday October 10 2014, @03:22PM (#104500)

    Most of these sorts of attacks seem to be using leveraged assets ladders.

    Where you compromise one computer to get at another with every higher rights.

    So even though you may have 100% secure leased lines. The other side of the house may want to use the internet. Then there is some bridge between the two...

    To do it truly right you have to have 100% segregated network and computers with review boards and change controls. Now that crap builds in time to complete and boring meeting headaches and empire building CYA managers. It also builds in a distrust of building a better network. Because 'should not do this' turns into 'do not ever do this even though now it is way better to do'. So you have to figure out what is your compromise just so you can have 'ease of use' vs 'security'.