DNC Hack Serves As Cautionary Tale For IT Pros - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
DNC Hack Serves As Cautionary Tale For IT Pros
Threaded  |  Newest First  |  Oldest First
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
7/26/2016 | 2:56:18 PM
Re: email matters
I remember a stat from SECTF's Chris Hadnagy from a few years ago that found that sending "phishing" emails to your own employees -- which, if they click through and fall for them, then force the employee to complete an on-the-spot 5-minute (or so) training on security -- reduces successful phishing attacks by 75%.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
7/27/2016 | 5:52:06 PM
Re: email matters
@Michelle: The key, of course, is to do this in a way that is still respectful -- and perhaps even a little apologetic and/or deferential.  Otherwise, you run the risk of what I've seen happen in other organizations: The staff is well-trained, but they come to resent and disrespect IT and all its security measures -- resorting to workarounds, Shadow IT, etc.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
7/27/2016 | 5:55:31 PM
Re: Who Hacked the DNC?
It is worth noting that officials are still officially referring to this as a "leak" and not so much a "hack."  The NYT and others are still referring to the notion that it was a hack as "unconfirmed speculation."  (And a leak/insider attack isn't so far-fetched, considering the circumstances.)

All we definitely know for sure?  WikiLeaks got a hold of the emails and released them.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Author
7/28/2016 | 10:42:30 AM
Re: Breeches and Delusions of Security
@Technocrati: ...Which leads to an important lesson that many security professionals don't think of: Don't be a target.

And this goes to the whole business -- not just security.  For example: A few years back, when Sony sued that kid -- a hacker -- for IP infringement just for tinkering with his PlayStation, they absolutely should have expected to get slammed the way they did for months by hacktivists.

Anticipating hacking/breach fallout is now a part of regular risk analysis for business decisions.  The CISO needs to have a seat at the table like a "big-boy" C-suiter.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Author
7/31/2016 | 9:15:13 PM
Re: Hack 'n sack knack
@Faye: Newest comments first is the default, but you can get threaded view.  At the top of the comments section page, you have the option to click Newest First, Oldest First, or Threaded View.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/1/2016 | 7:21:53 AM
Re: email matters
@Michelle: Additionally, even without that actively anti-IT but still laissez-faire culture, if someone does cross the IT line and then something bad happens (e.g., keeping proprietary business information on a personal device -- which then becomes lost, stolen, or otherwise compromised), the employee in many organizations is placed between a rock and a hard place: the employee could report the incident and risk getting in trouble, or the employee could say nothing -- putting the business at risk.

The answer, again, though, comes down to culture -- as I observed here: enterprisenetworkingplanet.com/netsysm/minimize-shadow-it-damage-by-encouraging-self-reporting.html
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/1/2016 | 7:23:03 AM
Re: Hack 'n sack knack
@Faye: You're very welcome!

Personally, I usually prefer new comments first, but sometimes I prefer to go into threaded view to follow particular conversations.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/23/2016 | 10:44:09 AM
Re: Who Hacked the DNC?
To be fair, more has been done with less -- particularly where nation-state-backed hackers are concerned.

And those who associate with Hillary Clinton have been subjected to hacks before with no "inside help."

My only point: Could have been an insider, but it could also not have been.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/24/2016 | 9:00:14 PM
Re: Who Hacked the DNC?
@vnewman2: One interpretation that I think is a valid one (as far as any speculation goes) is that certain pundits believe that a HRC administration bears a non-negligible risk of creating or exacerbating a "Cold War II" with Russia, whereas Trump has demonstrated a favorable attitude toward Putin and Russia's leadership -- and, accordingly, if Russian powers-that-be see it that way too, they may have acted such to advance their diplomatic interests.

That said, security expert Bruce Schneier has noted that if it was Russia (who is the most likely suspect at this point), in leaking these emails they're broadcasting to the Obama Administration that they have a wealth of emails and other information going back to 2013 -- and therefore are implicitly "threatening" that if the Administration sanctions them, there will be retaliation in the form of more leaks and revelations of yet more damaging information.


Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/30/2016 | 10:08:17 PM
Re: Who Hacked the DNC?
tl;dr: Sounds like it's a matter of picking between government conspiracies and corporate conspiracies.  ;)
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/30/2016 | 10:08:57 PM
Re: Who Hacked the DNC?
@vnewman: Or, if you're Snowden, a place to hide out.


2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
Remote Work Tops SF, NYC for Most High-Paying Job Openings
Jessica Davis, Senior Editor, Enterprise Apps,  7/20/2021
Slideshows
Blockchain Gets Real Across Industries
Lisa Morgan, Freelance Writer,  7/22/2021
Commentary
Seeking a Competitive Edge vs. Chasing Savings in the Cloud
Joao-Pierre S. Ruth, Senior Writer,  7/19/2021
Register for InformationWeek Newsletters
Video
Current Issue
Monitoring Critical Cloud Workloads Report
In this report, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll