Computerworld - Security consultants aren't surprised that someone managed to take a voice mail Hewlett Packard Co. Chairwoman and CEO Carly Fiorina left for HP Chief Financial Officer Robert Wayman last month and transmit it to the world.
Voice-mail systems and phone rooms tend to have less security than other sensitive areas in companies, and the four-digit personal information numbers used to guard access to user's messages can be easily cracked.
"My guess is that this info was obtained simply by guessing [Wayman's] password," said Todd Tucker, director of security and architecture at Pentasafe Security Technologies Inc. in Houston.
The San Jose Mercury News said it received the voice-mail message, in which Fiorina told Wayman she was worried about the outcome of the March 19 proxy vote on the HP/Compaq Computer Corp. merger, from an anonymous caller. HP has had little to say about the incident except that the message was genuine and that it takes the dissemination of private company communications quite seriously (see story).
But Tucker and others think HP has learned a lesson that all companies should take to heart.
"I think the biggest thing is that we continue to have wake-up calls on how security and privacy needs to be addressed, and this is definitely a wake-up call," said Rick Shaw, president of CorpNet Security Inc. in Lincoln, Neb. "Companies do not always cover their voice-mail systems with the same critical level that they would with the networks. The bottom line is ever since we started digitizing, voice mail it is just another file sitting on a server."
As such, Shaw said that anyone who can access that server can listen to whatever voice-mail messages are there. He said it isn't "that difficult" to go looking around on voice-mail servers and poking into different files to see what's vulnerable.
If the intruder finds something interesting, then downloading that information and spreading it to the rest of the world is even easier, Shaw said.
Another way companies leave themselves vulnerable is that they use systems right out of the box without configuring them for added security, said David Losen, director of secure systems at Sergeant Laboratories Inc., in La Crosse, Wis.
"If you do it right out of the box and think you are good to go, then you probably aren't," Losen said. He noted that it also depends on what kind of system companies use for voice mail, as some systems are left "wide open" to attack.
There is also a human element at play, Tucker said. People tend to forget about security or not think about itwhen they send e-mail messages or leave voice-mail messages containing sensitive data.
"They are unaware of the potential impact to either them or their company and underestimate the threat," Tucker said. "I doubt Carly Fiorina would have expected this kind of a backlash just from leaving a voice mail with someone."
On the other side of the equation is the fact that people can overestimate security measures that their colleagues, contractors and customers put in place and often believe that those measures are as good or better than their own.
"You have to be extremely careful when sharing information with any other person or party because you never know what level of security they have over their information," Tucker said.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts