This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Rob Enderle: You Are Your Worst Security Liability
While IT managers scramble to buy products to guard against external threats, they're ignoring the enemy within: Their own errors in setting up network security.
While IT managers scramble to buy products to guard against external threats, they're ignoring the enemy within.
No, I'm not talking here about dishonest and stupid users. The threat that security managers fail to protect against is themselves: You. You're failing to protect against your own errors in setting up network security.
You fail to take into account that threats will move where you are weakest, and not where you have strengthened your defenses.
You don't have to be the most secure, you simply have to be secure enough to either effectively block reasonable threats or convince attackers to attack someone else. You can't have perfect security; you have to optimize your available human and financial resources.
Your Employees Are Your Worst Security Liabilities
Your employees are probably more of a security liability than asset. And it's your hindquarters on the line. Analyst Rob Enderle provides tips and web resources on how to maximize your most valuable security defense: the two-legged kind.
ALSO: Buying The Firefox Hype
Firefox is an untested, unproven, unsupported product. Users looking for an MSIE alternative should wait for Netscape's innovative new browser release, says Rob Enderle.
Mistake One: No Security Goal
If you don't know where you are going it is reasonably certain you won't get there. The first step (after assuring you have good people), is to understand where you need to go. How secure do you need to be?
You should go beyond simple data security or physical plant security and include the security of traveling executives, branch offices, home offices, and key partners. Remember that most breaches now come through unsecured endpoints, so endpoints are where you will probably need to start, with regard to setting your goal.
Mistake Two: No Risk/Security Assessment
Next, you need to understand what your security exposure actually is. To do this, you typically need a security expert to come in and provide you with an assessment of just how exposed you are. You need to set the goal first, because the security expert needs something to set context, otherwise the assessment will showcase exposures that you don't need to correct and miss exposures that could be relatively important to address.
It is important that this assessment be done by an outside party who will not be involved in any corrective action, to avoid any conflict of interest. An insider, or outside vendor involved in implementing your security, might be tempted to cover up their own mistakes when they do the assessment. An insider might focus the effort to change the power structure inside the firm. And an outsider involved in implementation might over-inflate security expenditures to drive up their billables. By using someone that is independent of your company and your provisioning security vendor, you help insure that they are focused on your company's needs and not their own.
This is not a one-time event either, threats are rapidly changing and you will need to change your security plan to address these changes. In my view you should do this annually; this allows the assessment entity to remain up to date on your firm and gives you a relatively current assessment to use as a baseline to help determine needs when looking at changes or purchases addressing your security needs. Firms and organizations under high threat would probably need to do this more often, and there are some instances where an ongoing assessment would be the most prudent.
Mistake Three: No Plan
When I was a bodyguard the guy I worked for had a rather famous saying: "When you fail to plan, you plan to fail".
And that has never been truer here. In many cases, the layers of security you need are often interrelated. Think of it like building a skyscraper, if you didn't have a plan you'd likely not build the foundation strongly enough.
I remember a hotel I visited in Micronesia; it was made out of solid reinforced concrete and it was paid for by US taxes. They didn't think of plumbing and electrical wiring until after the structure was built . That oversight resulted in one of the ugliest buildings I've ever seen in my life, because both plumbing and wiring had to be run outside the building and through the halls, and then core-drilled into the rooms.
You often see failure to plan at national borders; they will spend a lot of money securing the border-crossing. while people continue to cross the border illegally, out of sight of the border station. This is the same as security the front door and datacenter but allowing rouge wireless access points in the company, which can bypass this physical and electronic security.
The security plan needs to address the issues identified by the risk assessment.
Mistake Four: Linux/Firefox
Actually, the mistake here is not implementing Linux and Firefox, but rather leading with the product and not leading with the plan.
I just chose these two platforms because some rather foolish people are making generic recommendations to move to those products to address security needs.
This mistake is actually more commonly made with security products.
The vendor will come in and pitch you using an insurance sale. An insurance sale is one where the salesperson scares you half to death by graphically describing possible, but unlikely, catastrophic events to get you to buy something you otherwise wouldn't buy. The buyer expends resources already targeted at something else to address this scary threat.
In the case of an OS or browser — neither of which are really security offerings in and of themselves — this practice may actually open you up to exposures the rest of your security infrastructure can't adequately address, because your security infrastructure was not designed with those platforms in mind. In many cases, the result of a platform change is actually a less secure environment, because the change is done without properly reconfiguring security infrastructure.
This doesn't mean those platforms are less secure, only that their introduction weakens the security infrastructure, because it wasn't designed for those platforms. The infrastructure needs to be redesigned to address the change.
Products come last. You may, in fact, decide to move platforms, but that decision should come as a result of the plan and not despite or without it. Platforms often have to balance between ease of use and security. Managing that balance requires adequate skills and surrounding products that can mitigate any related exposure.
In the end, your company has layers of security around it, much like a home surrounded by fences, with locked doors and windows, and with a panic room inside (a secure room with hardened walls you can lock yourself into if someone breaks into your home). The nature of the exposures you face, your resources. including the skill sets of your people, and your access needs define the nature of the security solution you provide. Designed right, you can do amazing things with a small amount of money and some training, done wrong you can spend millions and actually become less secure then you were when you started. The path is yours, here is hoping you pick the right one.
Rob Enderle is an analyst specializing in emerging personal technologies. He heads the Enderle Group, and has been an IT analyst since 1994. He spends his free time building computers and playing with personal technology prototypes. He can be reached at [email protected]. Contact the editor of Security Pipeline at [email protected].
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
State of the CloudCloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
IT Careers: Tech Drives Constant ChangeAdvances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market. Read it today!