Modern field guide to security and privacy

Opinion: The election's hard cybersecurity lesson

While politicians, pollsters, and the public will look for lessons in this historic presidential election, one of the biggest takeaways is everyone needs to do a better job when it comes to protecting their data.

Carlos Barria/Reuters
Hillary Clinton addressed her staff and supporters in New York City after the election.

Even though Donald Trump emerged as president-elect after a grinding election, history may ultimately judge meddling foreign hackers as the real winners.

The campaign saw an unprecedented number of high-profile cyberattacks, which led to seemingly daily revelations about party infighting gleaned from emails stolen from Democratic political groups.

Thanks to hackers, and the fact that organizations such as WikiLeaks published their spoils, we heard about aggravated Hillary Clinton supporters, improper "sneak peaks" of debate questions, and the Democratic National Committee's apparent support of Mrs. Clinton over her Democratic rival Bernie Sanders – revelations that led to several DNC resignations.

As historians begin looking at how Mr. Trump landed the Oval Office, they'll have to acknowledge email breaches at the Clinton campaign, the Democratic National Committee, and myriad advisers as damaging Hillary Clinton's campaign. She was the one candidate constantly thrown into damage-control mode by embarrassing emails, often derailing both her message and momentum – the most important factors in politics. 

And while many people – politicians, pollsters, and the public – will look for lessons in this historic presidential election, one of the biggest takeaways is everyone needs to do a better job when it comes to protecting their data.

Of course, Mrs. Clinton wasn't the only victim of the email dumps. When the website DCleaks published former Secretary of State Colin Powell's hacked personal emails in September, they exposed 14 potential acquisition targets of Salesforce.com. Mr. Powell sits on the board of directors for Salesforce, the customer relations software company.

In this instance, the fortunes of corporate America emerged as collateral damage in the no-holds-barred election battlefield. The Powell leak reveals how these kinds of breaches are more than just embarrassing; they can also cause real financial damage.

While some of the victims of the recent hacks may not be that technically savvy, even those of us who consider ourselves techies can lose sight of our digital footprints. With email and file storage nearly infinite now, and our smartphones syncing our contacts, photos, and documents seamlessly, sensitive data can accumulate in our inboxes and storage services over time. And that's a volatile situation if you don't have strong passwords, don't use two-factor authentication, and don't use encryption.

We should all routinely change passwords and use ones that are stronger, longer, and more complex, as opposed to ones that are easy to guess or hack. Taking these few extras steps now can help avoid arduous damage control down the road.

It's also important not to mingle personal data with your most sensitive work or financial information. If you can, use one device for personal matters and another for business. If you happen to serve in senior roles for your organization, explore whether they can provide you with a dedicated device to boost their security – and yours.

And remember that email does not come with guarantee of the right to privacy. In this day and age, any type of content from any device can be hacked. If you won't be comfortable seeing your email on the front of a newspaper, don't write it. 

Whether you're a chief executive officer, politician, celebrity, or just a regular Joe or Jane, your information, career, and reputation could be at stake if you're the victim of a data breach. If anything, the hacking that took place during the presidential campaign is a massive teachable moment for stopping poor personal security practices.

Yong-Gon Chon is chief executive officer of Cyber Risk Management. Follow him on Twitter at @YongGonChon.

Security Culture

This journalism empowers people to understand the bigger picture of cybersecurity as it connects to some of the most personal parts of their lives: their job, their education, the evolving digital culture around them, and the technology they use on a day-to-day basis. As part of the Monitor’s overarching commitment to chronicling human progress, we see these very human issues within cybersecurity to be critical and overlooked parts of the conversation.

This initiative is generously supported by

  • Northrop Grumman
  • ISC

 

You've read  of  free articles. Subscribe to continue.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Opinion: The election's hard cybersecurity lesson
Read this article in
https://www.csmonitor.com/World/Passcode/Security-culture/2016/1116/Opinion-The-election-s-hard-cybersecurity-lesson
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe