About Us | Contact Us
View Cart

Shredding: New and Old Risks

By Dan Hadaway | Saturday, December 10, 2011 - Leave a Comment

In these days of drill-down risk assessments on new technologies and issues ranging from mobile banking to customer awareness to social media to FILs and Supplements, I’m often asked: “Since we now have to track these risk assessment triggers do we need to continue the annual risk assessment?”

The answer is yes.

This can be illustrated by an interesting article my friend Joe Cychosz just liked on his Facebook page.

Elizabeth Montalbano of InformationWeek reports about a challenge held by the Defense Advanced Research Projects Agency (DARPA) to solve complex puzzles comprised of shredded documents.   Somebody rose to the challenge, and using math and computers, reconstructed five documents that had been shredded into 10,000 pieces.  They won $50,000.

In other words, shredding as a control just grew weaker.

Now I agree that the likelihood of somebody spending 600 hours manually trying out pattern combinations generated by complex computer programs on shredded documents stolen from your shred-company is very low.

But this article makes an interesting way to put out that:

1)    The controls we “declare” this year may not work as strong next year.  Bad guys learn ways around them.  Good guys forget about them.

2)    The likelihood of an attack this year may not be as low next year.  New attack methods can increase the likelihood of an attack.

3)    The value of a target (and thus the likelihood of an attack) can change over time.  If somebody can bottle the process up so that it only takes 20 hours to assemble the most likely permutations of shred pattern matches, it might be worth reassembling a report with a thousand names.  What was typically a worthless target (shreddings) may increase in value.

4)    Finally, the impact of an attack can change over time.  If a breach occurs today because somebody spent 600 hours reassembling a critical report, I don’t think it will hurt anybody reputationally.  It might even give them the ability to turn the situation into good press.  But ten years from now, you have to wonder if “algorhythm proof shredders” will be a high-risk issue on everybody’s audit checklists.

So yes, we need to dust off the “All-encompassing Ever-Growing Information Technology Risk Assessment” every year, taking a quick look at all asset-vulnerability pairs that were deemed “moderate/low” last year.

——————————————-——————————————————————–————————-

Dan Hadaway CRISC, CISA, CISM
Founder and President, Infotex

——————————————-——————————————————————–————————-

“Dan’s New Leaf” is a “fun blog to inspire thought in the area of IT Governance.”


 

 

Latest News
    from Dan’s New Role . . . And note the date! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Once again, I am turning over a new leaf.  Those who have not been following this blog for its full fourteen-year history might not realize […]
    Top Seven Risks . . . that small bank Information Security Officers face in 2023! When we present audit reports to boards of directors, we also talk to the board about the top risks the institution is facing. Since 2006, we have been compiling a list of the “top seven risks small institutions are facing,” in […]
    Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    The new plan calls for technology providers, and not end users, to be responsible for security… An article review.  Following multiple high profile cybersecurity incidents in 2021 and 2022 the Biden Administration recently announced new long-term goals for the nation’s cybersecurity, and under the new plan companies that provide technology would carry more of the […]
    R7: 2023’s Top Seven Technology Risks Webinar-Video What are the top seven risks your board should know about in 2023? Since 2006, Dan has been compiling a list of the “top seven risks small institutions are facing,” in preparation for his board presentations. This webinar will present the 2023 list in a manner that you […]
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]
    Times they are a-changin’ . . . The infotex website is being updated. You read that right! We are in the process of updating our website from the circa 2013 version we have had for far too long. As the Digital Media Manager for infotex this excites me greatly and I look forward to the […]
    A new Team member’s first article! In today’s news cycle, it is difficult to miss all the fuss about AI, or more specifically, ChatGPT. So many differing opinions on the matter can make it hard to decipher what the future looks like. Few people think AI is a gimmick, but not many know the possibilities […]
    A draft version of the new framework may be available as early as this summer… An article review. As the cybersecurity landscape is constantly evolving, the tools we use to address risk need to evolve as well–and by this summer we should be getting our first look at planned changes to the NIST cybersecurity framework.  […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]