Computerworld - Security consultants aren't surprised that someone managed to take a voice mail Hewlett Packard Co. Chairwoman and CEO Carly Fiorina left for HP Chief Financial Officer Robert Wayman last month and transmit it to the world.
Voice-mail systems and phone rooms tend to have less security than other sensitive areas in companies, and the four-digit personal information numbers used to guard access to user's messages can be easily cracked.
"My guess is that this info was obtained simply by guessing [Wayman's] password," said Todd Tucker, director of security and architecture at Pentasafe Security Technologies Inc. in Houston.
The San Jose Mercury News said it received the voice-mail message, in which Fiorina told Wayman she was worried about the outcome of the March 19 proxy vote on the HP/Compaq Computer Corp. merger, from an anonymous caller. HP has had little to say about the incident except that the message was genuine and that it takes the dissemination of private company communications quite seriously (see story).
But Tucker and others think HP has learned a lesson that all companies should take to heart.
"I think the biggest thing is that we continue to have wake-up calls on how security and privacy needs to be addressed, and this is definitely a wake-up call," said Rick Shaw, president of CorpNet Security Inc. in Lincoln, Neb. "Companies do not always cover their voice-mail systems with the same critical level that they would with the networks. The bottom line is ever since we started digitizing, voice mail it is just another file sitting on a server."
As such, Shaw said that anyone who can access that server can listen to whatever voice-mail messages are there. He said it isn't "that difficult" to go looking around on voice-mail servers and poking into different files to see what's vulnerable.
If the intruder finds something interesting, then downloading that information and spreading it to the rest of the world is even easier, Shaw said.
Another way companies leave themselves vulnerable is that they use systems right out of the box without configuring them for added security, said David Losen, director of secure systems at Sergeant Laboratories Inc., in La Crosse, Wis.
"If you do it right out of the box and think you are good to go, then you probably aren't," Losen said. He noted that it also depends on what kind of system companies use for voice mail, as some systems are left "wide open" to attack.
There is also a human element at play, Tucker said. People tend to forget about security or not think about itwhen they send e-mail messages or leave voice-mail messages containing sensitive data.
"They are unaware of the potential impact to either them or their company and underestimate the threat," Tucker said. "I doubt Carly Fiorina would have expected this kind of a backlash just from leaving a voice mail with someone."
On the other side of the equation is the fact that people can overestimate security measures that their colleagues, contractors and customers put in place and often believe that those measures are as good or better than their own.
"You have to be extremely careful when sharing information with any other person or party because you never know what level of security they have over their information," Tucker said.
Read more about Security in Computerworld's Security Topic Center.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!