Data Security Protocols Continue to Evolve featured image

Data Security Protocols Continue to Evolve

by John DiGiacomo

Partner

Internet Law

Despite more than two decades of efforts, computer and data storage breaches continue unabated. Washington State, for example, released annual statistics showing 280 data breaches in 2020 (including one breach that impacted more than a million customers) in Washington State alone. The report also detailed a large uptick in cyberattacks, and ransomware incidents.

As a result of seemingly never-ceasing efforts by cybercriminals, cybersecurity protocols continue to evolve. For example, the National Institute of Standards and Technology (“NIST”) recently announced a new framework for cybersecurity and ransomware risk management. Nearly every state has a statute or regulations that require government agencies and private businesses to take reasonable state-of-the-art steps to secure data collected and stored. The NIST standards are one of the benchmarks used when evaluating whether a government agency or private company has satisfied current state-of-the-art standards with respect to cybersecurity. For example, the US Department of Defense requires its private contractors to meet NIST standards when complying with cybersecurity requirements.

The new NIST framework is an effort to simplify how companies and agencies should “frame” cybersecurity issues because the actual protocols are very complex. On the one hand, organizations need a “high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk.” But, at the same time, an organization needs a simplified framework with respect to how to understand what it is “seeing” from the “high-level, strategic view.” In this way, an organization can better assess its mitigation and recovery readiness and gauge and manage its risks. The Framework provides a simple-to-understand five-word list of core cybersecurity objectives: identify, protect, detect, respond and recover.

On a practical level, NIST provides a long list of steps that “fit” into each part of the overall framework. A few examples include:

  • Audit and identify all systems and connected devices — identify
  • Differentiate data as high, medium and low risk — identify
  • Disallow personally-owned devices — identify and protect
  • Disallow personal use of organization-owned systems — identify and protect
  • Prioritize protection of high risk data such as data that allows person identification — identify and protect
  • Segment networks and firewall — protect
  • Allow only specific user activity and installation of apps — protect
  • Use multi-factor access protocols and other protections — protect
  • Assign, monitor and manage authorization and access credentials — protect and detect
  • Never stop using antivirus and other security software — protect, detect, response and recover
  • Update and patch constantly — same
  • Monitor continuously (both passively and actively) — detect, respond and recover
  • Actively block access to malicious activity — respond
  • Constantly train employees at the appropriate level — detect, response and recover
  • And more

Some of these evolving security protocols are already being put in place. For example, the Department of Defense recently modified its cybersecurity certification program for DOD contractors. Contractors have already been categorized into three levels of risk based on the data they collect and to which they have access. For the lowest level risk level, the DOD is making it easier for the contractors to obtain and maintain their certifications. If you have legal questions about data security, how to respond to data breaches and ransomware attacks or about hacking and cybercrime, contact the data security lawyers at Revision Legal at 231-714-0100.

Extra, Extra!
Recent Posts

The Minnesota Consumer Data Privacy Law: What Businesses Should Know (Part Two)

The Minnesota Consumer Data Privacy Law: What Businesses Should Know (Part Two)

Internet Law

In May 2024, Minnesota enacted the Minnesota Consumer Data Privacy Act (“MCDPA”). In Part One of this two-part article, the Consumer Data Protection Attorneys at Revision Legal discussed the consumer rights and consumer-facing business obligations imposed by the MCDPA, including additional consumer rights related to automated decisions that utilize profiling data. The MCDPA allows consumers […]

Read more about The Minnesota Consumer Data Privacy Law: What Businesses Should Know (Part Two)

Advantages of Forming Corporate Entities for Operating Your Business

Advantages of Forming Corporate Entities for Operating Your Business

Corporate

Under most circumstances, the experienced Business Lawyers at Revision Legal deem it prudent for clients to operate their businesses through a corporate entity like a standard corporation or a limited liability company. Of course, there are some circumstances where a partnership of some type might be the better option, but it would be a rare […]

Read more about Advantages of Forming Corporate Entities for Operating Your Business

The Minnesota Consumer Data Privacy Law: Summary For Consumers

The Minnesota Consumer Data Privacy Law: Summary For Consumers

Internet Law

In May 2024, Minnesota enacted a consumer data privacy statute called the Minnesota Consumer Data Privacy Act (“MCDPA”). About 20 States have enacted consumer data privacy statutes similar to the MCDPA, and the MCDPA follows the general template of those statutes. However, there are some unique and additional features of the MCDPA that are very […]

Read more about The Minnesota Consumer Data Privacy Law: Summary For Consumers

Put Revision Legal on your side