您现在的位置:ITGov-IT治理研究中心>> 研究>> 信息安全管理>>正文内容
Learn the five worst security practices in organizations
发布时间:2005年06月09日点击数: 作者:John McCormick 来源:本站原创
【字体: 收藏 打印文章 查看评论( 0 )】
摘要:

Takeaway:

Regardless of an organization's size, they all face the same security challenges keeping intruders away from their private information. However, most companies have a tendency to make the same mistakes. John McCormick details the five worst security practices found in businesses both large and small. 

--------------------------------------------------------------------------------

Want to stay on top of the latest security updates? Automatically sign up for our free IT Locksmith newsletter, delivered each Tuesday!

 

An individual using a single workstation, a small business with two or three PCs connected to the Net through a high-speed cable modem, the team responsible for the security of an enterprise network: Regardless of an organization's size, they all face the same security challenges keeping intruders away from their private information.

 

Unfortunately, people tasked with security keep making the same basic mistakes. Since it's once again been a relatively quiet week in the security world, I'm taking this opportunity to list the five worst security practices found in businesses both large and small.

 

1. Failing to enforce policies

Number one with a bullet is failing to properly set security policies, neglecting to train anyone with access to computers, and especially declining to enforce an established policy.

 

It's a truism that you get what you reward for and don't see as much of what you forbid. So if your organization wants good security practices, it must establish a clearly enunciated set of policies. Among other things, these policies must define basic usage rules, such as never opening strange e-mails, surfing random sites on personal business, or downloading files from the Web.

 

But security experts have been saying this for years, so why isn't it working? That's simple: Even when there are policies in place, there are seldom any real consequences for breaking the rules or any reward for those who don't.

 

There are a few organizations, including Harvard Medical School and Beth Israel Deaconess Medical Center, where being responsible for a single security breach is grounds for termination for anyone at any level. However, this practice is extremely rare, and few organizations, if any, have established a point system tied to rewards for following good practices.

 

Consider the impact that a significant prize for the employee with the best security record could have on security. For example, everyone could start with 100 points, losing one point for every out-of-policy security mistake, even if it doesn't result in actual damage or loss.

 

Establishing security policies that are more than a stack of paper and providing employee incentives for such policies could go a long way to helping organizations improve security.

 

2. Ignoring new vulnerabilities

Second on my list of the worst security mistakes is failing to take appropriate action when new vulnerabilities surface.

 

Most security managers receive automatic notification of new patches and/or monitor at least one security Web site. A significant number even subscribe to security-related newsletters, such as IT Locksmith, which attempt to filter out the noise and focus on serious problems.

 

But there is simply so much information available that many people don't even bother to read the alerts they subscribe to. A far smaller number actually adjust policy or perform updates to fix the problems they do learn about.

 

3. Relying too much on technology

Another big mistake is relying excessively on technological fixes and paying too little attention to actually using them.

 

For example, if you tell upper management that you've installed the top antivirus software or the latest star in the firewall world, they'll think you've done your job. But unless you've carefully configured that firewall and maintained the antivirus software, you really haven't done much of anything.

 

Setting up a firewall properly in some environments can be as much art as science. It isn't a set-it-and-forget-it task any more than installing antivirus software ends all your malware worries. Instead, you have to keep tweaking the firewall to meet new needs, sometimes even blocking some ports for a few weeks after a new port scanning epidemic surfaces.

 

And that goes back to the second biggest mistake you have to pay attention to new security updates and vulnerabilities as they emerge. For example, to keep track of the top 10 ports that would-be attackers are targeting, bookmark this SANS Web page. For antivirus programs, you not only need to update signature files; you must also monitor the need for patches to fix newly disclosed vulnerabilities in the antivirus software itself.

 

Anti-spyware software is much less complex than antivirus programs, so patches are seldom necessary. However, they require as much attention to downloading the latest database information as do antivirus programs.

 

Finally, don't forget that all these security utilities become worthless if you ignore the reports they generate.

 

4. Failing to thoroughly investigate job candidates

The fourth biggest mistake is failing to properly screen job candidates for criminal records or even poor financial decisions, particularly for candidates outside of the IT department.

 

Americans in particular feel that personal privacy is one of the most important basic human rights, and they tend to respect others' desires for privacy, which often results in a reluctance to investigate the background of job candidates. In fact, a recent IT Locksmith discussion questioned whether it's reasonable to use a person's financial history as a tool in deciding if he or she would make a dependable employee.

 

Many readers questioned this practice despite the fact that companies have widely employed it for two simple reasons. First of all, if people are careless with their own finances, how well will they protect yours? Second, if someone's under financial pressure, he or she is more subject to outside pressures to indulge in activities that compromise security.

 

Whether it's due to poor planning, poor impulse control, or simple carelessness, a recent bankruptcy in someone's financial history is always a big red flag unless there's a very good explanation. It may be sad, it may be unfortunate, but it's a common practice because it works.

 

5. Expecting too much from technical skills

The fifth biggest mistake and this is one I see all the time's an unhealthy reliance on the IT staff's technical skills for security planning.

 

When choosing someone to head up security, most managers see nothing but the incredible complexity of networks and software, and they then assume the best person for the job is the one with the most technical skills. However, while technical knowledge is necessary, a gut feeling for security along with a healthy dose of paranoia is far more important for the head of security, provided someone on the IT team has the knowledge and skills related to the technical side of software and hardware security.

 

Having a strong security background from a stint with a university police department and more time with a detective agency, I can often walk through a company and spot a dozen critical security errors, which render all the best software security practices completely useless. If I wanted to compromise some company's IT security, I would either get a job with the cleaning company or fake a UPS or FedEx uniform. I could walk in carrying a big package and simply walk out with what I wanted in the previously empty box. Think about it: Would that work at your business?

 

Final word

Last week, I listed some recent security breaches in California. Since then, details of yet another information theft have come to light, and this incident points out just how much security depends on an old-fashioned cop mentality.

 

On March 11, someone walked into a University of California Berkley office and walked out with a laptop containing personal data about more than 98,000 people, including Social Security numbers. This theft not only highlights the need for simple and basic physical security, but it also emphasizes a misplaced reliance on technology. Apparently, the university had instituted encryption technology. However, while they had scheduled the laptop for encryption, no one had yet encrypted the notebook's hard drive at the time of the theft.

 

This theft, as well as the data theft incidents at other California universities I described last time, are even more striking when you consider that California State University is presenting the third annual Information Technology Security Conference in San Diego this month.

 

The irony abounds, especially in this quote: "Major sponsorship from The California State University highlights the commitment of the higher education community to understanding and addressing the issues surrounding information security..." I was thinking of attending, but I balked at the idea of providing registry information online!

分享到:
点击按钮自动加关注代码——新浪微博 点击这里给我发消息
上一篇:什么是BS7799
相关文章
推荐文章
订阅
  关于ITGov | 联系ITGov | 收藏本站 | 服务条款 | 隐私保护 | 人员招聘 | 网站地图

京ICP备06004481号   Copyright 2002 - By ITGov.org.cn, All Rights Reserved

 

我要啦免费统计