Professional Documents
Culture Documents
requerimientos de seguridad en
términos de integridad,
proyecto y se convierta en un
habilitador de negocios (por cada caso
5 planes de acción).
Case Study: In Denial
Case Study: The Wrong Accounts
A public utilities company selling both gas and electricity had developed a web based
interface for its customers to manage their accounts on-line.
A major retail bank with a global brand name had established an on-line banking
service that boasted 1.2 million customers. It had decided to undertake a major
overhaul and re-launch of the web site, and as part of this re-launch one of the
much-vaunted features was to be improved security. This was at a time when
the lack of public confidence in Internet security was suffering heavy
battering in the popular press, and the bank had decided to take a pro-
active stand on this issue.
One customer discovered quite by accident that by removing part of the URL on his
browser command line, he could display a file that contained the bank account details and credit
card details of all of the customers who used this service - approximately 2,500 customers.
He had stumbled on this fact by pure chance as he mistyped the URL command. He
immediately telephoned the company, through their customer help line, and informed
them of the problem. They did nothing. He telephoned again to find out what was being
done, and was informed that it could not happen' and that there was no problem. He
offered to show them the evidence but they told him to stop annoying them.
The upgrade was implemented over a weekend. On Monday morning
customers began to log on to the new service. Several of them (not the
majority, just a very few, but plenty to be newsworthy) were presented with
the account details of another customer in place of their own!
The technical explanation seems to have been that when two customers
logged on at virtually the same time, the second customer was shown the
same details as the first. Oh dear!
As soon as the bank became aware of the problem and had verified its
existence they shut down the site (at 15:30 on Monday afternoon). The service
was closed for several hours and the old version of the system was
restored later that evening
In frustration he then copied the file onto his own PC and contacted another web
site that specialises in publishing juicy details such as these. They were delighted to
help and published the entire file. He then contacted the company again and told them
where they could look at their file. Their first response was to report this
gentleman to the police and have him arrested on suspicion of hacking into their
system. The newspapers loved this! Eventually they came to their senses, dropped
the charges, offered a statement of public thanks to the man for his assistance, and
invited him to advise them on security matters in future. (We are not sure that this last
point was entirely wise, but then we are seeing here a company that has little idea
how to handle Internet security issues. We would hazard a guess that this whole
incident was managed from a very technical perspective, with little or no input from
people with any real business acumen.) This incident tells you a lot about business
risk and Internet services. It is not just the fact that when these problems occur
and they get into the newspapers then the organisation suffers reputation damage.
This incident was handled with such crass lack of public relations finesse that you can
see immediately that there is more to business risk than technical failure. When the
technology fails (as indeed it will from time to time) then there must be an
adequate crisis management response that includes the very critical issue of
public relations management
The bank tried to stress that only a very few customers (around 10 in fact) had
experienced the problem, but that did not prevent the Tuesday newspapers
from carrying the story on the front page with headlines such as "Security
fear shuts on-line bank.
preguntas:
Estrategias para
convertir los casos de
estudio en casos
exitosos y habilitadores
de negocio.
• Teniendo en cuenta su perspectiva del ciberespacio y