Unencrypted backup drive, stored in safe, goes missing when safe is stolen. Credit: Thinkstock Letters from Washington State University (WSU) have begun to arrive in the mail boxes of approximately 1 million individuals whose personal identifiable information was compromised when a safe which contained a backup hard drive was stolen.WSU learned on April 21, 2017 that a “locked safe containing a hard drive had been stolen.” The hard drive contained the backup files from WSU’s Social & Economic Science Research Center (SESRC). On April 26, WSU confirmed PII was compromised. On June 9, they began informing those affected and sending breach notification notices to various state’s Attorney General Offices.In WSU’s public statement, they noted, “The drive contained documents that included personal information from survey participants, such as names, Social Security numbers and, in some cases, personal health information. Entities that provided data to the SESRC include school districts, community colleges, and other customers.”Normally when we associate a breach of this size, we ascribe it to a hacking incident or other technological magic. In this case it was a physical theft, of the safe, which was serving to protect the data stored within. The university in its letter to the New Hampshire Attorney General’s Office (NHAGO) noted that not all (though apparently some) of the files on the hard drive were encrypted. The breach notification letter to the NHAGO, noted that the information compromised was “personal information from survey participants and individuals in studies done at SESRC. Personal information was provided by Washington State agencies, colleges and school districts, among others, which included names, addresses, Social Security numbers, and in a few instances other types of information.” The two sample letters sent to those affected, which were provided to the NHAGO, were crafted for the aforementioned survey participants and a separate letter to the parents/guardians of minors whose personal information was contained on the hard drive. WSU noted, “the information on the hard drive had not been access or misused in any way.” How they know this was not shared.One year of identity theft protection was offered to all affected. Furthermore, their public facing statements all emphasize WSU having taken steps to strengthen their IT operations. The IT department at WSU did almost everything correctly in their data backup scheme. They backed up their data and secured at least one copy in a safe, offline. Thus from a business continuity perspective, in case of a catastrophic event they were able to recover. The fact that adequate protection was not afforded to the safe is self-evident.WSU also recognized their shortcomings in opting not to encrypt the entire hard drive, prior to storing. Encrypting the unattended, but “securely stored” hard drive would have rendered the theft of the safe and hard drive an event of much less magnitude. With the remediation costs of a data breach running at approximately $140 to $150 per record, this may well be a $100+ million event for WSU. WSU has provided a lesson to all entities that not all IT threats are technical, and that physical theft of data storage devices is a reality to be factored into each and every data protection and business continuity calculus. Related content news analysis China’s MSS using LinkedIn against the U.S. The head of the U.S. National Counterintelligence and Security Center says China's MSS is using social networks, specifically LinkedIn, to target, access, and recruit U.S. sources. By Christopher Burgess Aug 31, 2018 4 mins Social Engineering Cybercrime Security news analysis Tesla insider with expired NDA spills the tech beans A former Tesla engineer with an expired non-disclosure agreement (NDA) shared inside technical information on an obscure forum, which was quickly shared across multiple social media platforms. By Christopher Burgess Aug 30, 2018 3 mins Risk Management Security news analysis Horizon Air tragedy highlights airline insider threat vulnerability The ease at which a Horizon Air employee was able to steal and crash a Bombardier Q400 turboprop will likely prompt airlines to develop an insider threat mitigation strategy to close this vulnerability. By Christopher Burgess Aug 13, 2018 4 mins Security news analysis How did the TimeHop data breach happen? Compromise of an employee's credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts were compromised. By Christopher Burgess Aug 10, 2018 4 mins DLP Software Analytics Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe