Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Government United States

US Postal Service Suspends Telecommuting Following Massive Breach 50

An anonymous reader writes: The folks at the USPS have responded to the recent breach that exposed data on 800K employees and another some 2.8 million customers. They have suspended telecommuting for all employees until further notice while they replace their VPN with a more secure version. "Additionally, the postal service will upgrade some of its equipment and systems in the coming weeks and months as part of a broad security overhaul in response to the breach."
This discussion has been archived. No new comments can be posted.

US Postal Service Suspends Telecommuting Following Massive Breach

Comments Filter:
  • What were they paid to do?
    • Answer calls in the style of a call center.. Postal rates are complicated right now, so to get an exact price for a big shipment the average user needs to speak with somebody.

    • the mailman have to do there time cards and TSP reports somehow.

      • by mattjh ( 1314791 ) on Tuesday November 11, 2014 @09:04PM (#48365073)
        I don't post much, don't read much on here anymore either, but I can't resist...TSP report? Try TPS. 800k not delivering the mail? Try data RELEASED on 800k employees, not by faulty VPN configs USED by 800k employees. PTPP VPN? Try PPTP. For such a self righteous "we're always right" bunch of users, you people sure aren't putting much effort into this.
    • The summary says that data on 800k workers was exposed, not that 800k workers were telecommuting. The linked article does not put a number on how many workers were telecommuting.

      Also, although I don't know whether it is done in practice it is not impossible for an urban mail carrier to never go to the post office. The green boxes are used as intermediate collection points for carriers that are on foot.

  • "Since Target’s breach last fall, numerous business and organizations including Home Depot, JPMorgan, Supervalu, Community Health Systems, UPS Stores, Dairy Queen, and others have announced breaches that cumulatively have exposed data on tens of millions of people. The sudden rash of data breaches has left security experts scrambling to find a reason for what is going on". ref [darkreading.com]
  • ... patch later.

  • Before looking at the technological failure point I would like to know why that much data is exposed to a vpn connection in such a way that it can be exploited.

    Surely you have to treat the machines on the other end of the vpn as hostile. You don't have them inside your controlled network 100% of the time (not to mention even if you did you should treat them as hostile). How is it that even if someone managed to gain access to a vpn connection that they could hit the database servers for that much data?

    I'm

    • Before looking at the technological failure point I would like to know why that much data is exposed to a vpn connection in such a way that it can be exploited.

      Because idiot IT "consultants" generally view the firewall as the only important line of defence. I can't count the number of business I've gone into to clean up a mess, and found the perimeter firewall to be....well...mediocre, and the internal security to be absolutely non-existent. Basically, the assumption is that anything that's on the network is supposed to be there, so you don't set anything up to question it.
      I've seen databases set up to allow root/sa access to anything, with no password. If I qu

      • I can "kinda" understand that in a small shop. But with sooooo many employees your risk of bad hardware being brought into the office is huge. And what's more, it's the postal service. You know, the place that had the term "go postal" named after it. Surely you would assume your employees were high risk if they named "going crazy and shooting people" after your company.

      • Usually, I have found the culprit in large organizations with strong granular security to be the <proprietary single purpose business application> developers and support. The number of times I have watched a new person get onboard and have proper, restricted intranet access, and then the application support people have to open everything up to them to get that one proprietary app to work is astounding.
      • by Rich0 ( 548339 )

        Before looking at the technological failure point I would like to know why that much data is exposed to a vpn connection in such a way that it can be exploited.

        Because idiot IT "consultants" generally view the firewall as the only important line of defence. I can't count the number of business I've gone into to clean up a mess, and found the perimeter firewall to be....well...mediocre, and the internal security to be absolutely non-existent. Basically, the assumption is that anything that's on the network is supposed to be there, so you don't set anything up to question it.

        I work in a Fortune 500 company, and anybody on a VPN can ping any database server in the company. If they have valid credentials, they can log in. For some servers the application accounts are extended into the database so if you know where the database is you could log in and query the whole thing (ie bypassing the front-end and any business logic it might enforce - hopefully the DB account would be read-only but I wouldn't count on it).

        Internal security tends to be very light. Maybe they're running ID

    • by tlhIngan ( 30335 )

      Surely you have to treat the machines on the other end of the vpn as hostile. You don't have them inside your controlled network 100% of the time (not to mention even if you did you should treat them as hostile). How is it that even if someone managed to gain access to a vpn connection that they could hit the database servers for that much data?

      I'm sure I am missing something but I would have thought there should be an application layer between any user and the raw data and that you would have to know how t

      • * 2FA on VPN (RSA Tokens)
        * Separate Administrative credentials used by IT staff
        * Dedicated administrative workstations that IT staff do not use to do daily tasks (email, web, etc.)
        * OR dedicated IT jump box requiring further 2FA to log in to.
      • Of course it can be leaked. 1 screenshot at a time. But there is no reason that they should be able to dump data on 800k employees and 2 million + customers.

        That should have taken someone a lifetime, one screenshot at a time.

        The HR department does not need access to the customer records. The HR department does not need access to bulk information. The application developer pool should not have access to the live production database from a remote location. The developer should be given access to a saniti

        • by Rich0 ( 548339 )

          The application developer pool should not have access to the live production database from a remote location. The developer should be given access to a sanitised database clone.

          In many the two are one and the same, and they access the database from halfway around the world. Physical access isn't always compatible with $15/hr, and you can imagine which sounds more important to the typical PHB...

  • Sounds like it's time to get rid of those Win2k servers.

    • Server 2K3 also uses PPTP, which is known to be broken, and no fix is planned from MS, despite the fact that 2K3 is still supported til next year sometime.

  • How the bleep does the mailman get to telecommute???

    Marissa Mayer is the devil incarnate - but even I'll agree, delivering the mail kinda sorta has to be done in person.

    • How the bleep does the mailman get to telecommute???

      Marissa Mayer is the devil incarnate - but even I'll agree, delivering the mail kinda sorta has to be done in person.

      Yes, because everyone working for the Postal Service is a mailman/woman.

      They are a unique organisation in that they require no HR, planning, IT, marketing, finance, management, sales, payroll, admin or training support staff whatsoever.

    • FYI, not everone at the Post Office delivers mail. In other news, not all Delta employees are pilots and not all NASCAR employees are drivers.

"Look! There! Evil!.. pure and simple, total evil from the Eighth Dimension!" -- Buckaroo Banzai

Working...