Compromise is not a secure option

June 2017 News & Events

The past couple of months have been interesting for those in the security industry, especially cybersecurity. With thousands of computers hit by ransomware across the globe, we’ve all had a glimpse of the future: nothing and no-one is safe, and more importantly, you can’t trust those you think you should be able to trust.

The guilty parties in most of these cases were not the criminals themselves, although attacking hospitals is the kind of thing one only expects from the lowest of the low, but the government agencies who kept the software vulnerabilities that were exploited to themselves. It seems like a good idea if your goal is to make everyone in the world subject to your hacking proclivities, but it also shows an extremely immature approach to security.

That may seem like a bold statement, but I don’t think anyone with a real security mindset could believe that they would be the only ones to discover a way in, whether it’s into an operating system or a secure building. There is always some smart person somewhere who can do whatever it is you can do. So hiding vulnerabilities, in my opinion, is stupid.

It’s also very 18th century to take a huge risk in the belief that everyone will keep a secret, especially in a world where names like Assange, Manning and Snowden are held in high respect for exposing abuses of authority, even to their personal risk. As changes in the world show a diversion from the ideals of democracy and liberty that were once held aloft as the ultimate goals for every nation, more people are going to become disillusioned, look for a way to work against ‘the man’, which will result in more leaks and people doing things they think are right, even if they are against the rules.

Keeping vulnerabilities secret in this environment is unconscionable. That’s not to say they should be publicised as soon as they are discovered, but they need to be brought to the attention of those they put at risk and solutions need to be put in place as quickly as possible.

This applies to physical security as well as the virtual world where we already see companies forcing more secure practices from users (except the cheap-and-nasty brands which exist because they cut corners). Whether it is simply forcing users to change default passwords, securing backdoors and hard-coded access routes, or whatever the latest security issue is, each step towards hardening your setup is the right one to take for the vendor, customer, end user and integrator.

End users can no longer afford the luxury of waiting until it’s convenient to ensure their security is up to date, vendors can no longer take the risk of ‘saving’ security upgrades in the hope of selling it as a feature in a new version, and authorities can simply not play childish games and put everyone at risk by hoarding vulnerabilities.

As we have found out and will yet more painfully learn over the next year or two, compromising and kowtowing to criminal and anti-democratic agendas only benefits the criminals.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.