Shilling Q&A sheds light on evolving career, easily achievable privacy enhancements
Although the Communicators Club’s October luncheon program has taken place, we wanted to share some of the insight and actionable information on offer from our guest speaker: Data security expert Cameron Shilling.
We asked Shilling, an attorney for two-plus decades with a focus on cyber security, to address some of the big questions in data security and privacy; the McLane Middleton-based lawyer also provided some easily achievable actions to protect yourself online.
Needless to say, we asked Cam to save the most specific tips and strategies for his Oct. 1 audience. Still, he graciously shared some options that should greatly increase your ability to protect your personal and/or business data from the growing threat of cyber attacks.
Question: Without getting into details, is a main thrust of your Communicators Club presentation to educate attendees to be more proactive in protecting their private data? Can the bad actors truly be kept at bay?
Answer: My goal is to inform attendees about the tangible steps they can take to protect their businesses, so that they feel this process can be accomplished (as opposed to being a confusing and daunting process). With proper security – including readily available and affordable measures – we can protect against the vast majority of bad actors.
Q: Have you always been interested in data privacy and security, or is it a specialty you’ve been drawn to as your legal career progressed? Was there a particular incident or experience that galvanized your interest?
A: I have been a lawyer for 25 years, and focused on information privacy and security for the past 10-plus years (which is almost as long as the legal field has existed). I come to this from a depth of expertise in both business counseling and litigation, as well as forensic investigations in commercial litigation. Like many careers, I did not precisely plan to be an information security lawyer, but rather had the right skill set and motivation at the right time for industry growth.
Q: How have your data-privacy pursuits evolved with the ever-growing reach and sophistication of hacking techniques? Is it a constant learning curve?
A: Staying on the leading edge of information privacy and security is a daunting and daily task. I constantly read technical articles and legal blogs, and frequently meet and work with technology security experts.
In particular, whereas the main focus of the industry for the first eight years (2008 to 2017) was information security, the big growth and significant focus of the last three years has been information privacy — particularly because of the European General Data Privacy Regulation, or GDPR, and the California Consumer Privacy Act.
Q: As the Internet of Things grows and more household- and business-based devices are equipped to “phone home,” are there ways to take advantage of that ease of information retrieval (“Hey, Alexa”) without completely sacrificing privacy?
A: Absolutely. The best practices with respect to protecting IoT devices are to route them through a secure network (these are available for both business and residential use), and enable inherent protections on the devices themselves. We frequently help businesses and families do this, and also can connect businesses and families with the right technology consultants to do so.
Q: What’s your stance on the recent spate of ransomware exploits targeting municipalities across the nation — underscored by the widespread takedown of services in Baltimore?
A: Local and state governments are prime targets because they have relatively weak security, high-value sensitive information, and (generally) decent funding to pay ransom. Unfortunately, these entities are behind the curve with respect to information security. Local and state government needs to act rapidly, and devote the resources to conducting immediate risk assessments and starting to implement security measures that will make them less vulnerable.
Q: Are there circumstances that justify these communities’ insurers paying the ransom, or has it set a terrible precedent that ensures an escalation in attacks and ransom-payment demands?
A: Paying ransom should not be the first or only option. Entities with robust backup systems never have to pay ransom. Similarly, many entities can restore operations even without robust backups, though doing so is more costly and time consuming.
If an entity is unable to restore its critical systems, paying ransom may be unavoidable. However, entities that do so need careful counsel. Ransom is negotiable, and sometimes insurable. Care needs to be taken to ensure that paying the ransom will ensure the return of information, and that the attackers did not leave backdoors open. Anyone impacted by ransomware needs immediate counsel from experienced legal and technological experts.
Q: Is there a question (or two) you’re sure to be asked during the Q&A portion of these presentations?
A: Yes. “How much does it cost to do a comprehensive risk assessment?” and “How long does it take to do the assessment and implement the remedial measures?”
Q: Have you dealt with data-privacy threats in your family and home life?
A: I am very careful with my family’s information security. Children and the elderly are prime targets for personal identity and financial theft. I have locked every family member’s credit accounts. We all have a credit/identity restoration insurance. We all use password managers and encrypted devices. And our home network is well protected. These are core personal-protection techniques that are not excessively costly or difficult to implement.
Q: Finally: What is one thing anyone reading this post can do in the next 10 minutes to more effectively safeguard their personal and/or business data?
A: While it is impossible and inappropriate to single out one security measure, there are a few on the short list. Every business needs to implement effective multi-factor authentication for as many systems and applications as possible, including email, virtual private networks (VPNs), primary networks (e.g., network access control, or NAC), and critical on-premises and cloud-based applications.
Every individual needs to lock/freeze each of their three credit accounts, purchase credit/identity restoration insurance, and harden the defenses surrounding their home networks and personal devices.
We thank Cam for his assistance. Please reserve your place for Cam’s presentation now!