A former cyber-security director at the S.C. agency hit by hackers told lawmakers Thursday that the state Department of Revenue spread responsibility for protecting computer systems to "overtaxed" employees after he departed in 2011.
Stretching oversight led to gaps that increased chances for theft, said Scott Shealy, who ran computer security at the revenue department through late 2011. Hackers stole personal financial records belonging to 6.4 million consumers and businesses in September.
"Things would have been under much more scrutiny" with the previous security team, Shealy told the state House special committee examining the hacking.
Shealy, who works at the state judicial department, also said his boss at the time, chief information officer Michael Garon, did not make security a priority.
Shealy said he left the agency because of Garon's lack of support, including not following a recommendation to encrypt data that would have made accessing the information difficult and adopt a dual password system. The hackers stole unencrypted data. Dual passwords would have thwarted the theft, an expert hired by the state said.
The department's computer security job was not posted until five months after Shealy left and was not filled until August, the agency said.
The revenue department has said Garon's departure from the agency in September was unrelated to the hacking, which was not discovered for another three weeks by the Secret Service. Efforts to reach Garon were unsuccessful.
The revenue department did not address Shealy's accusations in its response.
"As an agency we are focusing on what we can do in the future to help prevent similar occurrences," the agency said in a statement.
Hackers appeared to access the revenue department computers through a program released in a malicious email opened by an employee, according to a report from computer forensics firm Mandiant.
Meanwhile, the total cost of the massive cyber-hacking at the S.C. Department of Revenue remains unclear as lawmakers begin work on a new budget.
South Carolina has spent $20 million to offer credit monitoring, bolster security at the agency, mail notifications and hire computer consultants, outside attorney and public-relations firm.
But other state agencies, which operate their own computer systems, are expected to request their own security needs. Lawmakers and state budget officials did not have estimates on Thursday. One legislator floated a $100 million estimate during a hearing last month.
“I can see it now, every agency in the state of South Carolina is going to come with their hand out, ‘We need this for cyber security,’ ” Sen. Harvey Peeler, R-Cherokee, told reporters during a legislative preview Thursday. “Whatever the price tag is that’s what we need to pay. It’s the government’s responsibility.”
House Ways and Means chairman Brian White, R-Anderson, said lawmakers are awaiting word from a consultant that state plans to hire to assess the state’s cyber-security needs.
Meanwhile, a Senate special committee investigating the hacking is looking to enroll people for credit monitoring automatically and provide longer-term credit report protection.
The state is offering year of credit-report monitoring to 3.8 million taxpayers whose personal financial information was stolen from the Department of Revenue. A second year is under consideration.
But information belonging to 1.9 million dependents also were taken, meaning infants could face identity theft risks for their lifetime, said Sen. Kevin Bryant, an Anderson Republican who chairs the hacking special committee.
“We have a 90-year-old problem,” he said.
The committee also wants to enroll people automatically for credit monitoring, giving them an opportunity to opt out. More than one million victims have enrolled. Legislators are weighing proposed laws to put computer security under one director.
Lawmakers remain upset that South Carolina allowed what’s considered the nation’s largest-ever hacking of a state agency.
A computer consultant hired by the state to probe the hacking said the Department of Revenue could have protected the data with a dual-password system that costing an estimated $25,000. The stolen information that included Social Security numbers also was not encrypted.
“I’ve never found a need to call the Department of Corrections and say, ‘Hey, are y’all locking the doors at night?,” Bryant said. “It seems like protecting the most sensitive database in the state would be a no brainer.”