Global Warming Email Hack Reveals Value of Routine Correspondence

 Several solution providers and security vendors have told me of late that the biggest stumbling block in selling protection technology to SMBs is their perception that they have nothing to protect. Perhaps that’s true since the value of the information is in the eyes of the owner, and many don’t consider email to be necessarily […]

Written By: Lawrence Walsh
Nov 21, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

 Several solution providers and security vendors have told me of late that the biggest stumbling block in selling protection technology to SMBs is their perception that they have nothing to protect. Perhaps that’s true since the value of the information is in the eyes of the owner, and many don’t consider email to be necessarily “valuable.”

That’s not the case at the University of East Anglia, which suffered an email security breach that exposed a cache of correspondence between global warming scientists that discuss, among other things, how to counter skeptics. The messages, some say, contain evidence that proves a conspiracy exists to promote the notion that the mean global temperatures are rising and will result in catastrophic disasters if reformers are not enacted.

The New York Times reported the breach this morning, and goes into great detail about the global warming debate and conspiracy theories. Security practitioners will read between the lines that value of data is subjective. The correspondence owners really don’t understand the uproar over their leaked messages since science often use the word “trick” in reference to correcting anomalous data. Since they saw it as routine, they probably didn’t think it would be of value to anyone outside their circle.

Conspiracy theorists, on the other hand, see the emails as evidence that the world is being duped into believing catastrophe is upon us. Even those neutral in the debate say the email cache will become an extremely important part of the historical record. In other words, they see tremendous value in the data.

Whenever an SMB says they don’t have any data in need of protection, the real reason may be one of two things: they’re ignorant to the value of their data or they don’t have the money to secure their data. Explaining how others may find value in even routine data and how low-hanging fruit such as leaked emails could cause irrevocable harm to their business might just be the motivator for security investments.

Recommended for you...

Arctic Wolf Research: Cyber Insurance Driving Security Needs

Arctic Wolf’s 2025 outlook shows MSP opportunities as insurers tackle ransomware threats and emerging AI risks through expanded security partnerships.

Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA

MetTel secures a $54M contract to modernize 15,000 VA phone lines across 1,875 locations using its POTS Transformation solution, enhancing reliability and performance.

Jordan Smith
Aug 8, 2025
Galactic Advisors Wins Credential-Free Assessment Patent

Galactic Advisors patents a user-activated, credential-free pen testing tool, boosting MSP security with risk-free, forensic-grade assessments.

Jordan Smith
Aug 6, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.