• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Complacency Will Get You Killed, Security Researcher Says

    April 9, 2007 Alex Woodie

    Think you’ve surrounded yourself with enough security to prevent getting hacked? Think again. Good security practices require you to assume you will be hacked, and places the onus on how you react after the fact, according to a new report written by Mike Rothman, an independent security expert, who cheerfully titled it “The 10 Darkest Truths About Information Security.”

    Rothman’s paper, which was distributed by the security software firm McAfee, is a chilling reminder that, most of the time, your security provisions will not stand up to hackers, who are out there gunning for people like you and organizations like yours every day. The only reason you’re not scared silly is because they haven’t gotten to you yet. If you’re lucky, they never will. But who wants to rely on luck? If you’re not paranoid, you should be.

    “The fact is, complacency will get you killed,” Rothman writes. “New attacks are happening at a ferocious pace, users are willingly giving away their private information, and today’s standard defenses are no longer enough to protect critical information. Those that cannot make a compelling case for continued investment in proactive defenses against these attacks have no chance against the bad guys.”

    Rothman’s first truth–dare we say the most important truth?–is that you will be hacked. “The sad truth is that your network and applications can be compromised at any time,” he writes. “It usually takes them less than 10 minutes, and there isn’t much you can do to stop it. So the first step is to acknowledge there is no such thing as 100 percent security.”

    The second truth is accepting that you can’t get everything done. Instead, you must prioritize and tackle the most important problems first, much like a battlefield medic performing triage. According to Rothman, users are the path of least resistance (the third truth), so that probably means you should explain to them the principles of Safe Internet Behavior, and maybe instill a little bit of healthy paranoia in them, too.

    Applications–particularly Web applications–are the next weakest link. Do your best to keep them patched, and you’ll minimize your exposure, Rothman advises. “If there is a positive spin here, it’s that there aren’t enough bad guys to go around either, so the hope is that you won’t be targeted. But hope is not a strategy. Do a Web application scan and patch up the holes ASAP–before your number comes up,” he writes.

    Next, install an integrated suite of security software–just running antivirus software doesn’t cut it anymore. “You want to add more sophisticated defenses, including anti-spyware, host intrusion prevention, application control, and data encryption to protect those devices,” he says. “The good news is, many of these functions are increasingly being bundled into a single offering that can be managed centrally. That’s a good thing.”

    If you’ve followed Rothman’s advice up to this point, you’re probably exhausted. The good news is, you don’t have to do everything yourself. It’s okay to outsource some functions, such as e-mail security or firewall monitoring.

    Remember the first rule about getting hacked? Rule number seven is where that rubber meets the road. “Make sure you know exactly who is supposed to do what at the moment of truth,” Rothman writes. “Ensure that senior management is on board with your plan and that you will be able to recover and remain operational.”

    Rules eight and nine deal with the Payment Card Industry (PCI) data security standard, and IT auditors. Rothman’s advise: take them both seriously, and don’t piss off your auditor.

    Lastly, remember there’s no glory in security. If your IT architecture is functioning in its usual state of semi chaos, you’re still in the game. “Security is a process, not a product. It’s a culture, not a service,” Rothman writes. “A lot of security professionals want to write a check and make the problem go away. Unfortunately, if it were that easy, everyone would be doing it.”



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 14 -- April 9, 2007

    Sponsored by
    Computer Keyes

    Fax Directly from your IBM i

    KeyesFax is a full function automated IBM i fax system. Spooled files are burst by fax number and auto transmitted with overlays.  It combines both a send and receive facsimile processing system with a complete image package.

    The fax software will edit, send, receive, display, print, and track fax documents or images using any standard IBM i without additional expensive hardware, software or subscriptions.

    Computer Keyes has been developing Software Solutions since 1978!

    www.computerkeyes.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Graphically Moving i5/OS Objects with OpsNav Aldon Tackles Parallel Development Problems with LMi 7.5

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 14

This Issue Sponsored By

    Table of Contents

    • ERP Vendors CMS Software and XKO Software to Merge
    • Complacency Will Get You Killed, Security Researcher Says
    • Zend Issues a PHP Innovation Challenge to i5/OS and OS/400 Shops
    • PHP-Based Mantis Help Desk Application Coming Soon to the System i
    • Goldman Sachs Says IT Spending Will Soften a Bit in 2007
    • ERP Vendors CMS Software and XKO Software to Merge
    • Is the Adoption Rate of Server Virtualization Technology Over Estimated?
    • As I See It: The Legacy
    • A Trained IT Staff Is A Happy and Competitive One
    • Security Still an Issue in 2007 for System i5 Shops

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
    • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
    • i-Rays Brings Observability To IBM i Performance Problems
    • Another Non-TR “Technology Refresh” Happens With IBM i TR6
    • IBM i PTF Guide, Volume 27, Number 18
    • Will The Turbulent Economy Downdraft IBM Systems Or Lift It?
    • How IBM Improved The Database With IBM i 7.6
    • Rocket Celebrates 35th Anniversary As Private Equity Owner Ponders Sale
    • 50 Acres And A Humanoid Robot With An AI Avatar
    • IBM i PTF Guide, Volume 27, Number 17

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle