This story appeared on Network World at
RSA: Maximizing customer harm
'Net Insider By
Scott Bradner, Network World
May 31, 2011 01:24 PM ET
When news of the major RSA breach broke about two months ago I complained that the company was not being all that upfront in telling customers what the breach might mean to them (also see: "Ensuring mistrust"). Now we hear that the break-in at giant defense contractor Lockheed Martin may be an example of the fallout of the RSA breach (also see: "RSA tokens may be behind major network security problems at Lockheed Martin").
You would still be hard-pressed to find any useful information on the RSA website about the original breach. The only thing on the front page that seems to be related is a "new security brief" on "Mobilizing Intelligent Security Operations for Advanced Persistent Threats," which seems to be a bit of a "try to make money from what we did wrong" document.
Something real did happen at RSA, judging from a report in The Wall Street Journal that RSA is providing tens of thousands of free replacement SecurID tokens to Lockheed.
If you look hard enough on the RSA website you can find the April Fools' Day blog posting on the attack ("Anatomy of an Attack"). But RSA does not make it easy to find anything else relevant.
This is hardly the way I would want a major security vendor to act. As I write this, the Bloomberg cable TV channel is speculating on the likelihood that the Lockheed breach was, indeed, a result of the RSA breach. Not good press for RSA, made far worse, in my opinion, by RSA's refusal to come clean.
From press reports, RSA seems to be justifying its refusal to provide key information -- like what was actually stolen -- on the assumption that it would make things worse for their customers. That seems like a totally bogus rationale -- hey RSA, it looks like the bad guys who took the info know what they got. The main people in the dark are those who spent big bucks on your products. You are not telling them how deep the doo-doo is. You are also not saying that you will change the design of your products to make this type of breach unimportant in the future.
What should you do if your company gets hacked in a way that will impact your customers? A lot of companies just want the problem to go away and do not want to shine any light on the situation because it could show that the company does not know what it is doing in the area of security.
The "nothing to see here, move along" approach is harder now that most states require customer notification in the case of breaches that involve specific types of information, but some companies still try to follow that path.
A far better path to ensure long-term customer trust is to provide all the information you can that will not actually harm the customers.
Put an obvious link on your home page that customers can use to find out your side of the story and leave the link there until the threat is gone -- i.e., do not follow RSA's lead.
Disclaimer: Harvard is more of a leader than a follower but has not expressed any opinion on the RSA path. So the above advice is my own.
All contents copyright 1995-2011 Network World, Inc. http://www.networkworld.com