Jump to content

In the week of the OPEN MINDS conference on technology, which focuses in part on the future of da...


G+_Wing
 Share

Recommended Posts

Originally shared by Carl Green

 

In the week of the OPEN MINDS conference on technology, which focuses in part on the future of data security and breach protection, this next item seems highly relevant. It is a story which shows how easy it can be to be the unwitting source of a data…

http://gystservices.com/blog/2014/11/08/true-tales-of-technology/

Link to comment
Share on other sites

Thanks, Blaine. This is one example chosen from a long list that I could have picked from to highlight the point. In the regular world, chances of this turning into something that makes headlines is very small. But then the world of security is built on very small probabilities, isn't it?

Link to comment
Share on other sites

I remember talking to a government security guy back when workstations were being installed across the whole administration. He was asked where the vulnerabilities were in their deployment. HIs answer was "the people". The biggest risk factor in securing information, among the many which can be listed, are the people you are trusting with these secrets.

 

I've kept those words in memory ever since (this was the early 80s) because almost every breach I've seen since had a root in the people who were casual or ignorant of their failure to think about security.

 

I once learned an entire government department was sharing the same password in order to make it easier for themselves. How so many people could have agreed to this was beyond my comprehension. But once I learned of it I took steps to get it stopped. These people needed an intense course in what could go wrong with that thinking. They were part of a sensitive government service but they felt their particular department did not handle the truly sensitive data requiring extra effort to secure.

 

No matter where I go I see plenty of situations which clearly show it is the people who end up causing a breach. It's not all just lazy programmers.

Link to comment
Share on other sites

 Share

×
×
  • Create New...