RSA issues security tips to SecureID customers after data breach

RSA, the security division of EMC, has issued a list of security recommendations to SecureID customers after reporting a data breach

RSA, the security division of EMC, has issued a list of security recommendations to SecureID customers after reporting a data breach.

The company contacted customers after attackers used advanced persistent threat attacks to breach its security systems and steal data.

Some of the data, the company said, is related to RSA's SecurID two-factor authentication products.

In an open letter, Art Coviello, executive chairman at RSA, said although the information could not enable direct attacks on SecurID customers, it could potentially be used to reduce the effectiveness of a current implementation.

"We strongly urge immediate customer attention to this advisory, and we are providing immediate remediation steps for customers to take to strengthen their RSA SecurID implementations," the letter said.

In addition, RSA has issued a list of general recommendations that organisations should follow to improve overall security defences.

RSA recommendations

  • Increase focus on security for social media applications and the use of those applications and websites by anyone with access to their critical networks
  • Enforce strong password and pin policies
  • Follow the rule of least privilege when assigning roles and responsibilities to security administrators
  • Re-educate employees on the importance of avoiding suspicious emails, and remind them not to provide user names or other credentials to anyone without verifying that person's identity and authority
  • Pay special attention to security around active directories, making full use of security information and event management (SIEM) products and also implementing two-factor authentication to control access to active directories
  • Watch closely for changes in user privilege levels and access rights using security monitoring technologies such as SIEM, and consider adding more levels of manual approval for those changes
  • Harden, closely monitor and limit remote and physical access to infrastructure that is hosting critical security software
  • Examine helpdesk practices for information leakage that could help an attacker to perform a social engineering attack
  • Update security products and the operating systems hosting them with the latest patches


For a Security Software ROI calculator from Nucleus Research, click here.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.