Infosec experts divided over 23andMe’s ‘victim-blaming’ stance on data breach

Infosec experts divided over 23andMe's 'victim-blaming' stance on data breach

January 4, 2024 at 01:34PM

According to 23andMe’s legal representatives, the data disaster in October was allegedly caused by users’ poor password practices, while the biotech company’s infrastructure management was not to blame. The company pointed to users recycling compromised credentials as the main reason for the security breach. This response has been widely criticized from a PR and infosec perspective.

Based on the meeting notes, the following key takeaways can be summarized:

– 23andMe is pointing to user negligence and the reuse of compromised credentials from other breaches as the primary cause of the data compromise, rather than acknowledging any fault in its own security measures.

– The company’s response to the breach has been criticized from a public relations standpoint, with industry experts and professionals expressing disapproval of 23andMe’s position. Many emphasize the importance of organizations taking responsibility for cybersecurity breaches within their infrastructure and implementing robust security measures, such as multi-factor authentication (MFA).

– Suggestions have been made for 23andMe to integrate tools like HaveIBeenPwned into their sign-up/sign-on flows to prevent the use of compromised credentials and to make 2FA the default setting for all users.

– While some industry professionals argue that users bear a level of responsibility for choosing strong passwords and protecting their data, the consensus leans towards holding organizations like 23andMe accountable and prioritizing stronger security measures.

If there are any additional specific details or clarifications needed, please feel free to ask.

Full Article