In a major lapse, the Swedish Transport Agency leaked sensitive details of millions of transporters and military personnel to unauthorised individuals when it uploaded its database on the cloud in plain text.
The Swedish Transport Agency says it is taking steps to ensure such a lapse will not happen again.
In 2015, the Swedish Transport Agency hired IBM to manage its databases and networks, part of which involved sharing everything the agency had with the company. During the transfer, the agency uploaded its entire database on a cloud server and then emailed the database to marketers in plain text.
At the same time, the agency also gave unrestricted access to the database to IBM employees located in the Czech Republic as well as in other countries. As such, unauthorised IBM employees and marketers could easily access the Transporter’s database without having to break a sweat.
According to The Hacker News, the data breach exposed ‘names, photos and home addresses of millions of Swedish citizen, including fighter pilots of Swedish air force, members of the military’s most secretive units, police suspects, people under the witness relocation programme, the weight capacity of all roads and bridges, and much more’.
The breach was discovered by Swedish authorities almost a year after it took place and subsequent investigations resulted in the dismissal of the agency’s Director General Maria Ågren in January this year. She was also fined half a month’s pay for being careless with secret information.
‘The best way to reduce the risk of deliberate or accidental data exposure is to limit access to those who need it the most – keeping sensitive data locked down – and to monitor data access so that when something suspicious happens, you can catch it before it turns into global headlines,’ says Ken Spinner, VP of Global Field Engineering, Varonis.
Spinner adds that employees cutting corners, making simple mistakes and not following security habits end up causing serious breaches.
‘Limiting data access and taking a privacy-by-design approach goes a long way in proactively protecting critical data. Perhaps most importantly, government agencies – and any organisation that processes and stores sensitive data – need to establish and uphold strong cybersecurity and data protection practices: not only for internal use but for all third party contractors as well,’ he adds.