Security Team Practices Theft by Delusion
A key modem disappears from a high-security area. A case of BlackBerry devices disappears in transit. These tales of apparent theft take an unexpected twist.
Computerworld - We've been robbed!" That a modem had been stolen right from under our noses seemed unlikely at first, but as the IT security team and I frantically searched for it, I declared that it could be the only possible explanation. The annual audit was only days away, and we had to double-check all of the modem phone numbers before the auditors descended upon us. We needed to document the numbers to keep them satisfied.
Specifically, we were about to be audited on our perimeter network security. The audit team would be checking our firewalls, proxy servers and, most importantly, dial-up security.
The risk of an unsecured modem is still high for my company. In the past, the risk came from users wanting to bypass corporate controls and get unfettered Internet access by dialing in from home. Now most employees have broadband and no longer try to do this. On the other hand, more and more systems come with dial-up connections to allow vendors to manage them remotely. Vendors have been driven by increasingly stringent service-level agreements for performance and a desire to help customers without the expense of sending an engineer on-site. These days, it's rare for any of our large disk storage arrays or Unix systems not to have a trailing phone line behind the box.
We regularly call every number on our exchange and check what answers and how difficult it is to guess a working password. We hadn't done a scan in a while, and in the last few days before the audit kicked off, we wanted to run a quick test before the auditors did.
But we needed a modem, and ours wasn't to be found. The IT security department is supposed to be a high-security area, but many other staffers have access. We wondered if one of them had made off with our modem. Rather than waste time asking everyone with access to our area about this, we decided to view the closed-circuit television footage of our work area.
So my team went down to the physical security office and asked to view the tapes. There was an enormous collection, so it took about 10 minutes for each tape to be pulled from the archive and loaded. We started with tapes from a few weeks back. The modem was clearly visible, sitting neatly on top of one staff member's computer. Then we pulled a tape from a week ago. Although a few papers had collected in front of the modem, it was still clearly visible.
We continued to pull tapes, steadily
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!