back to article TalkTalk attack: UK digi minister recommends security badges for websites

The UK's digital minister Ed Vaizey has floated the idea of adding kitemarks to websites that have strong security measures in place, following the attack on TalkTalk's business last week. Speaking in Parliament on Monday in response to an urgent question on data breaches and consumer protection, following the ransack of …

Page:

  1. 0laf
    Meh

    That'll be Security Essentials (self assessment) or Security Essentials + then.

    Neither really bad things but not really suitable to multi-billion pound high profile telcos or other high profile organisations.

    Why not just get one little bit of the company ISO27000 accredited then claim everything is great everywhere, forever? That's what everyone else does.

    Then you ask for the scope of compliance and it all goes quiet....

  2. wolfetone Silver badge

    At least he's right about the terms and conditions not being easy to understand for most consumers, and his only problem with what he said is that he didn't stop after saying the above. No, he kept going, and removed all doubt that the man is in fact an idiot.

  3. 2460 Something
    FAIL

    Demonstrable negligence should be the way forward against talk talk, they ARE legally obliged to protect their customers data.

  4. A Non e-mouse Silver badge
    Black Helicopters

    Government & Encryption

    Of course the government aren't against encryption - providing THEY have access to the decryption keys. (Preferably without needing a pesky court order)

  5. Tony S

    What we are now seeing is a round robin game of "It's not my fault; place the blame somewhere else!" Deeply unedifying and considerably less than useful.

    Essentially, we need people in charge who are going to stop pontificating, point scoring, political spin doctoring or in any other way, trying to wriggle out of their responsibilities; and then actually getting down to identifying precisely what is needed (without a knee jerk reaction) and subsequently ensuring that it is done.

    In other words, earn their pay.

    1. annodomini2
      Pint

      I'd give you a pint if it were possible.

  6. John H Woods Silver badge

    "There has been some misinformation that the government are somehow against encryption," the minister said, without elaborating further.

    Well, I'm not sure it's tactful for a minister to say that it was actually his prime minister who was responsible for the said misinformation, which is probably why he did not elaborate further.

    [Edit: Back on topic, what's the point of a kitemark? You cannot purchase anything without giving payment details, so the advice is one of two things (a) people should use one-off payment (bitcoin?) for everything or (b) companies that cannot safeguard such information should be prosecuted.]

    1. Anonymous Coward
      Anonymous Coward

      > You cannot purchase anything without giving payment details

      Yes and no. For example, I can buy something using Paypal and, although Paypal have my details, the retailer that I am buying from does not.

      Perhaps the Government should be encouraging banks to provide this kind of service for retailers at a sufficiently low price that they will adopt it rather than roll their own?

      1. Camilla Smythe

        Yes and No

        "Yes and no. For example, I can buy something using Paypal and, although Paypal have my details, the retailer that I am buying from does not."

        you received a payment of $XX.XX from 2+2=5@pantysniffers4U.yandex.ru

        Glad to be corrected..

        1. Stoneshop

          Re: Yes and No

          you received a payment of $XX.XX from 2+2=5@pantysniffers4U.yandex.ru

          At least that's sufficiently less sensitive than your credit card details.

    2. dogged

      > Well, I'm not sure it's tactful for a minister to say that it was actually his prime minister who was responsible for the said misinformation, which is probably why he did not elaborate further.

      That would be the same Prime Minister who claimed he was going to safeguard tax credits and wouldn't permit any cuts during the election? That Prime Minister? I don't think he has many issues about bullshitting the public, somehow.

    3. Doctor Syntax Silver badge

      "Well, I'm not sure it's tactful for a minister to say that it was actually his prime minister who was responsible for the said misinformation, which is probably why he did not elaborate further."

      There you are, you see. You've been misinformed. The Prime Minister never said such a thing. On the contrary he's been following the TalkTalk saga and is quite adamant that if his strong recommendation for encryption had been followed it wouldn't have happened. And anybody who said anything different has been spreading misinformation.

      Now do you understand?

  7. Dan 55 Silver badge
    Flame

    "There has been some misinformation that the government are somehow against encryption"

    The prime minister* going on record in a speech as wanting to ban encryption is called misinformation?

    Bunch of weasels, the lot of 'em.

    * I would normally use a more derogatory term but I want to get my point across.

    1. Anonymous Coward
      Anonymous Coward

      Re: "There has been some misinformation that the government are somehow against encryption"

      They don't oppose encryption.

      They oppose *good* encryption.

  8. Destroy All Monsters Silver badge
    Megaphone

    Knowledge is a Crime, Encryption is Self-Abuse, Freedom is Slavery etc.

    "There has been some misinformation that the government are somehow against encryption"

    Indeed, they are not "somehow" but "very much" against encryption.

    1. streaky

      Re: Knowledge is a Crime, Encryption is Self-Abuse, Freedom is Slavery etc.

      If it wasn't they'd have shouted down GCHQ, the police et al in public - given that's what civilian governments are supposed to do when military intelligence starts overstepping it's bounds against innocent civilians.

      There's no technical solution that's effective so they [the current government] are by definition anti-encryption, anti-privacy, anti-freedom nut-jobs and it should be stated so at every opportunity.

  9. Your alien overlord - fear me

    Hey, I've got a badge companies can put on their website. Looks a bit like a padlock and is placed on the address bar.

    Oh wait, that might confuse Average Joe into thinking their data is really secure.

  10. Ru'

    Can we not just start fining organisations properly, and perhaps jailing some CEO/CIO types, when the breaches occur? Seems to me that there is little incentive for proper security for the pointy haired ones.

  11. Anonymous Coward
    Anonymous Coward

    Genius. Right click --> Save As --> Certification!

    Finally a government process I approve of. Doubtless the minister had something more convoluted in mind and you can guarantee that there would be fee-clipping along the way but bloody useless however it's implemented.

  12. Anonymous Coward
    Anonymous Coward

    This whole thing is making me ever angrier.

    And every time I see these utter bastards trying to dodge the shit I get angrier. TalkTalk need to be made an example of, they need to be dragged over the coals to show all the other companies that data security needs to be taken seriously. Visa and Mastercard need to pull their card servicing until talktalk sort their shop out or else PCI can go fuck itself, it really is just 600 pages of scratchy toilet paper.

    This isn't acceptable that this is allowed to happen.

    As someone who takes my job very seriously and views myself as a custodian of our customers data with a duty of care to them, knowing that this will make an already impossible job all the more impossible if they don't get heavily fined and seriously punished just makes me want to throw the towel in. What's the point in taking customer data seriously if nobody else does?

    1. m0rt

      "What's the point in taking customer data seriously if nobody else does?"

      The point is that *you* do. That is where any revolution starts.

      PS - I hope that wherever you work, it is somewhere I am a customer. I appreciate the passion.

    2. Anonymous Coward
      Anonymous Coward

      TalkTalk is hilariously allowing customers to exit their contract without paying a penalty as 'a gesture of goodwill' - so long as the customer can prove their finances were compromised as a consequence of the hack. Clearly Dido (£4 million pay packet last year) is worried about a mass exit of people who don't think TalkTalk is capable of managing a whelk stall let alone personal information.

      Rather than a grudging gesture of goodwill, TalkTalk should be begging customers not to sue them for the damage and distress caused by their incompetence and be engaging in a recreational firing o their senior staff who have allowed not one, not two, but three major data breaches in the last year without apparently learning anything.

      In an ideal world, the whole wretched company would be destroyed because of this, but they'll get away with a fine (if it is anything less than the maximum £500k it will show how broken the DPA is), and the CEO will probably ooze on to another equally well remunerated job to fit in between being a Tory peer in the HoL.

      1. Dan 55 Silver badge

        Their T&Cs are worth nothing. They've broken the DPA even though it doesn't mention encryption by name, the customers' data is out there and they've broken the Supply of Goods and Services Act three times in the past year. If it went to any small claims court the customer would win.

        1. Anonymous Coward
          Anonymous Coward

          > they've broken the Supply of Goods and Services Act three times in the past year

          FOUR times in the last twelve months; they got popped last November too.

      2. Anthony Hegedus Silver badge

        I once left talktalk (home) supposedly out of contract (I just left my contract after some annoying indian chap at wankwank phoned me and promised me lower phone bills and they ended up being double!), When their "solicitors" phoned me I told them I will not pay them a penny under any circumstances ever, because they broke the contract. I never heard from them again after that (about 5 years ago).

        More recently my company cancelled 50 broadband lines with them because of their incompetence, and they kept chasing us for money. They gave up after a couple of years.

        They are just an incredibly incompetent bunch of crooks. I wouldn't trust that dildo woman to pour piss our of a boot with the instructions written on the heel. She would graciously allow some people to break their contracts?!? Fuck that, people should leave in droves. They won't be able to cope!

        1. Fraggle850

          @ Anthony Hegedus

          >I wouldn't trust ... to pour piss our of a boot with the instructions written on the heel.

          Nice turn of phrase, well and truly purloined for future use. Can certainly see me making use of that when referring to manglement and m.consultants.

    3. tiggity Silver badge

      "Visa and Mastercard need to pull their card servicing until talktalk sort their shop out"

      You mean those same supporters of "verified by visa" where (in a web page that behaves like a xss vector) you have to enter characters 2,4 and 7 (or some other combination) of characters of your password.

      Which means password not stored as hash.

      Password either stored plaintext or encrypted with on demand decryption (hopefully the latter as better than plaintext, but depending what encryption is used, key management methods etc. could easily be relatively insecure)

      Not convinced Visa et al are great models for web security

      1. Velv
        Boffin

        "You mean those same supporters of "verified by visa" where (in a web page that behaves like a xss vector) you have to enter characters 2,4 and 7 (or some other combination) of characters of your password.

        Which means password not stored as hash."

        It is possible to encrypt and hash the individual values of each character and store those for later comparison of an encrypted result with the need to decrypt. With a limited set of single values it is possible to brute force each value if you can get directly to the service interface, so you still need to secure against brute force attempts on a users password values.

    4. Hollerith 1

      Mr or Ms Coward, I agree: it is a point of personal pride

      I do a lot of things, as it is clear you do, to meet my own standards of quality. These are usually higher than what my dearly beloved company would ask, but they don't know what to ask for, would be content to take the lowest-possible threshold of acceptability, if proffered by a consultant, so I don't tell them what I am doing and am willing to spend the extra time creating security etc that would not shame me if I fell under a bus and a colleague such as you replaced me. If someone like you can look at what I' created and think "well done, good job", then I know I've achieved the standards I aim for.

  13. GregC
    Coat

    Badges?

    We don't need no stinkin' badges!

    Someone had to say it....

    1. Anonymous Coward
      Anonymous Coward

      Re: Badges?

      Badges?

      Do you want badges motherbitch?

      I give you badges!

      99 cents each.

      I sell you some.

  14. Christoph

    A kitemark says that way back when it was awarded, no obvious security holes were found. It does not mean that the site is secure. But way too many non-technical people will think that it does mean that. As will way too many managers who will assume they don't need to keep spending a fortune on keeping the security current.

    It only takes one tiny slip in security to compromise the entire site.

    1. Doctor Syntax Silver badge

      "A kitemark says that way back when it was awarded, no obvious security holes were found. It does not mean that the site is secure."

      Could it be made meaningful?

      1. Requires regular 3rd party checking to a given standard, preferably including pen testing. Regular as at mandated intervals, say 6 monthly.

      2. Date of last test shown on site.

      3. Covered by insurance. Preferably no limit to amount insured.

      4. Expiry date of current insurance shown on site. If the amount of insurance is limited this should also be shown.

      This would mean that there would be at least two parties, the testing company and the insurers and maybe also the testing company's insurers standing behind the site's certification.

      It could work, it wouldn't be cheap but it would mean that you'd be able to identify a site that took security seriously.

      Self-certification? ROFLMAO

  15. Fraggle850

    The only way to make slack-ass PLCs take their responsibilities seriously

    Is to hit them where it hurts. There have to be appropriate penalties, financial penalties should scale according to number of people affected, severity of data loss and the size of the organisation responsible. There ought to be criminal negligence prosecutions in the worst cases and certainly penalties along the lines of banning negligent C-suite execs from directorial roles.

    Some half-baked bureaucratic 'certification' that no one understands and with likely poor implementation is going to be worse than having nothing at all.

    I never tought I'd say this but I actually look forward to the more proportional sanctions that the incoming new Euro rules seem to make possible.

    1. Anonymous Coward
      Anonymous Coward

      Re: The only way to make slack-ass PLCs take their responsibilities seriously

      Is to hit them where it hurts.

      That's true, but the problem is that fines don't hit executives. They get treated as "other operating expense" and rarely affect the bonuses that the bosses get. Look at how banks have been hit with billions in penalties and compensation costs, yet they serially mis-sell, and have continued to pay obscene bonuses throughout the financial crises of recent years.

      The way to hurt corporate bosses is banning the company from selling anything for a period. That affects growth targets, churn targets, profit targets, customer satisfaction targets, market share targets, operating cost targets. And that affects bonuses, without actually taking money off the company that has ultimately been paid by the customers affected. Such a ban becomes a public badge of shame, and corrodes employee morale. In this case a six week ban on Talk Talk recruiting new customers or selling new products to existing ones would seem about right. Unfortunately MPs and their lickspittle civil service advisers are too dim witted to realise this, and whenever sanctions are called for, they fall back on the hackneyed and proven-not-to-work "fines up to 10% of turnover" or similar. Except in data protection, where fines up to £0.5m are deemed adequate.

      For Talk Talk, that's a fine less than 0.03% of turnover. Is anybody surprised they don't take infosec seriously?

  16. Anonymous Coward
    Anonymous Coward

    "It has to be said that companies should encrypt their information.

    Likewise the goverment. But God forbid customers, cause for customers encryption can cause all sorts of problems (for our brilliant intelligence services), it's illegal (or should be) and is PURE EVIL, no misinformation about that!

  17. Bronek Kozicki

    ICO is right

    For one, database encryption wont't usually protect against SQL injection attacks, since venue of attack works on already decrypted data. Multiple layers of protection are not an option, they are a necessity.

    Although of course, I can recommend single 100% effective layer of protection for firms which absolutely cannot be bothered to implement more than one. Disconnect all computers from power, remove all storage devices and destroy those in fire, returning remaining hardware to seller. That usually stops idiots from putting sensitive data on them!

    1. Dan 55 Silver badge

      Re: ICO is right

      But given the nature of their customer data and the amount of customers they have, that data needs to be encrypted, it's not optional any more. It also needs to be accessible to the web front end only by stored procedures and the formatting (e.g. hiding digits with *s) needs to be done inside the stored procedure.

      In that quote the ICO seem to be wiggling out of it instead of gearing up to give them a record fine and publicly humiliating them.

    2. Stuart Halliday

      Re: ICO is right

      Put data on small pieces of cardboard, place in filing cabinets and lock the door.

      There, that'll work.

  18. Quids
    Trollface

    How about a badge to say the website is susceptible to SQL Injection attacks

    1. Haku

      It almost sounds like someone could write a program that automatically scans websides for SQL Injection attacks, then use said SQL Injection attack to put a badge on the website...

      1. Dan 55 Silver badge
        Coat

        Which website is that... pastebin?

    2. Stoneshop
      Devil

      "Welcome, Bobby Tables"

  19. leon clarke
    FAIL

    Read the PCI DSS and weep

    PCI is both an intolerable pain in the ass to comply with and completely inadequate at protecting consumer's interests. However, when you look at it, it's all quite reasonable, in the sense that if you're going to write a box-ticking assessment standard to prove a system is secure then PCI does about as good a job as is possible. There aren't absurd pointless requirements or obvious omissions.

    So the question for any such kitemark is how does it compare to PCI. Is it more onerous, in which case no-one will bother. Is it less onerous in which case it gives no meaningful assurance of anything. Is it the same, in which case no-one will bother and it gives no meaningful assurance of anything.

    1. Doctor Syntax Silver badge

      Re: Read the PCI DSS and weep

      "So the question for any such kitemark is how does it compare to PCI"

      As per my other post. There needs to be 3rd party audit/testing and insurance cover.

      1. leon clarke

        Re: Read the PCI DSS and weep

        That falls into my 'more onerous than PCI' category. No-one will bother with compliance unless it's made mandatory, and if anyone suggests making it mandatory then some trade association will invite lots of ministers to their long conference in the Bahamas to convincingly explain why it's a bad idea. (The more factual aspects of this presentation will involve remaining competitive with economies that don't have excessive red tape. Funding this trade association's blatant bribery would be much cheaper than complying with such a certification)

        I entirely agree that to offer any useful protection such auditing and insurance is needed.

  20. Anthony Hegedus Silver badge

    well obviously, you can't put the kitemark on your site unless you've got the correct certifications. Malware website designers will be trembling at this news - there's no way they'll get the kitemark so nobody will go to their websites. Problem solved. Why hasn't this been done before?

    In other news, only genuine goods are allowed to have the word "genuine" on them, and only non-burglars are allowed to wear non-black-and-white-striped tops.

  21. Jake Rialto 1

    A Nice Shiny Badge

    It will be the equivalent of saying "come and have a go if you think you're hard enough", to the hacking community.

    And once the first company with it's nice shiny badge gets hacked, it will back to the hand wringing again.

    Talk Talk skimped on it's web application security tests - either by only testing major releases and not bothering with small scale changes, or just missing it out all together.

  22. This post has been deleted by its author

  23. Anonymous Coward
    Anonymous Coward

    Brilliant this, isn't it?

    Talk Talk, who have No Fucking Idea how to keep their data secure, get hit by a massive security breach. So they wheel out their CEO, who has No Fucking Idea what she is talking about, to explain it to a mass media that has No Fucking Idea what she said, nor what the problem is.

    Luckily a government minister - who has No Fucking Idea what to do either - is on hand with a cretinous proposal for self regulation, which has No Fucking Chance of working.

    Until we start punishing them, companies will not pay proper attention to our security. Offending firms need to be brutally fined, to the point where their top management starts worrying about the forthcoming removal of working tax credits. Customers should also be allowed to switch providers with no penalty if there's even a sniff of lax security.

    Hit them in the pocket, it's the only language they understand.

Page:

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like