Yet more data leaks in UK public services

Posted by   Virus Bulletin on   Jun 20, 2008

Confidential health service info exposed after theft.

Despite a wealth of recent incidents of data loss from various areas of the UK's public services, including data sent insecurely through the post, another rash of information leaks have shown that public servants still have not caught on to the fact that the personal and confidential data in their trust needs to be safeguarded.

The theft of six laptops from a hospital in Tooting, south London, exposed the personal details of 20,000 patients. Although the hardware was kept locked up, the data was not kept fully encrypted and officials have admitted that it was inappropriate to store the data on portable systems, while highlighting the likelihood that the machines would be wiped by the thieves.

The incident continues a string of similar leaks and thefts from a various government departments and public organisations, and was quickly followed by a less high-tech data security breach, when a set of secret anti-terrorist intelligence documents were left on a train (more on this in the Independent on Sunday, here). The rash of data exposures has heightened fears that plans to unify and expand information held by central government will inevitably put citizens at risk of identity theft and fraud if security measures are not properly implemented.

In a move to alleviate such fears, the UK's Financial Services Authority (FSA) has imposed a fine on a stockbroking firm for failing to adequately protect their customer data, as reported by Out-law.com here. More details of the hospital data loss is at the BBC here or in the Times here, with comment from Sophos here.

Posted on 20 June 2008 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.