← Back to Resources
Articles

App security, and breach reports from government agencies

February 25, 2020 2 min read

Reports on data breaches and concerns over data security only increase in number and magnitude as time goes by.  All you have to do to see the evidence is examine any data security incident.

This is especially true in Canada, where reports occurred six times more in 2019 than in 2018.  Thanks to the Personal Information Protection and Electronic Documents Act (PIPEDA), which serves as a new notification requirement for Canadian companies that experience breaches, more companies were compelled to file any incident.  One of the more glaring reports is that there were almost 8,000 data breaches across several government departments, compromising the information of 144,000 people (I’m actually surprised it wasn’t more).  The greatest of these belonged to the Canadian Revenue Agency (CRA), which totaled almost half of the data affected.

Of course, Canadian government agencies aren’t the only ones fighting against this threat.  It’s been some years now since the Office of Personnel Management (OPM) experienced its unsurpassed breach, and now the Defense Information Systems Agency (DISA), an agency at the US Department of Defense (DoD), is facing something similar.  Earlier this month DISA sent out notifications that it was facing a potential breach that could compromise the personally identifiable information (PII) of thousands of military and civilian personnel in its employ, including Social Security numbers.  According to the agency, there is yet no evidence that the information has been misused.

Meanwhile, application security continues to frustrate IT teams and users alike.  Noam Rotem and Ran Locar, security researchers who we’ve covered multiple times, have discovered another data breach, this time in the photo printing App PhotoSquared.  Upwards of 100,000 customers had their information exposed, such as pictures, print labels, addresses and invoices.  The breached database that stored the information was on Amazon Web Services (AWS) with an unsecured client S3 bucket, which we have also observed in past security incidents.  One of which was likewise uncovered by the Rotem and Locar duo and affected British citizens and a host of their data, from job applications to emails to tax documents.

“It’s important to note,” add the researchers, “that open, publicly viewable S3 buckets are not a flaw of AWS. They’re usually the result of an error by the owner of the bucket,” and that “owners at times fail to implement basic security protocols.”

The trend of data breaches, and naturally the notifications that follow, only looks to further increase.  This is why it’s more important than ever to take stock of your resources, your data collection and protection policies, and cyber insurance.

 

By: Jonathan Weicher, post on February 25, 2020
Originally published at: http://www.netlibsecurity.com
Copyright: NetLib Security

Related Articles

Press Release: Announcing Encryptionizer Winter 2026 Release and EKM Upgrade

NetLib Security Announces Winter 2026 Release with AI-Driven Enhancements and Major Upgrades to Encryptionizer Key…

2026 Is Here and Encryption Is No Longer Optional

NetLib Security announces the general availability of Encryptionizer Winter 2026 Release From the desk of…

Safer Passwords: The Relationship Advice Your Security Stack Needs

February brings two of our favorite holidays: Valentine’s Day and Change your Password Day (Feb…

Ready to protect your data?

Try Encryptionizer free — no commitment required.

NetLib Security
AI Assistant · Online
Hi! I'm the NetLib Security assistant. I can answer questions about our encryption solutions, HIPAA compliance, Encryptionizer, and more. How can I help you today?