The top 10 Internet security scr*w ups!

December 2003 Information Security, Fire & Safety, News & Events

With over 10 years' experience defending against Internet security threats, Tom Salkield, managing director of NetConnect, has seen it all. NetConnect, part of Netstore plc, is one of the founders of the UK Internet security industry, and Tom has dealt with just about every end-user mistake, error and c*ck-up that you could imagine. He readily admits that the practical world of business is a distant cry from his early experiences of information security when studying at Royal Holloway College, recognised to be one of the leading colleges in the field of IT security. Here we have asked him to list his current top 10 Internet security scr*w-ups! So here they are, in reverse order:

10) Failing to archive firewall log files. Firewalls are often correctly configured with full logging enabled. This tends to generate massive amounts of data, but often they are referred to only when there is a problem. However, left untended they can become a problem in their own right. Before you know it you have 10 GB of data and a shortage of disk space. Complete system failure soon follows and often the system has to be rebuilt from scratch.

9) Not knowing where your passwords are documented. Nothing makes supporting customers more of a challenge than if they cannot remember where their passwords are documented. That is, of course, if they had correctly and securely documented them at all. Often passwords remain in the heads of administrators, and are simply shared by word of mouth. You might as well write them on a poster and display them on an office wall.

8) Not scanning e-mails for viruses. Without question, e-mail borne viruses are today the biggest Internet security threat. Fortunately most businesses and large networks have e-mail virus scanning - either deployed in-house or using one of the growing number of managed services. Unfortunately some businesses, typically SMEs, still do not see the need, thinking that it is sufficient to deploy workstation virus products. Why let the viruses through the front door in the first place?

7) Not blocking instant messaging on your firewall. With Microsoft now in a big push to get people using their IM technology we are beginning to see IM clients freely deployed in businesses, mainly by users. Without proper auditing and control, IM simply opens up a porthole that can be used by the unscrupulous to disseminate viruses and worms. If you have not thought through the challenges of allowing IM onto your network, the simplest thing to do is to block it at the firewall.

6) Depending on users to patch their own workstations. Let us face it; users are terrible at following instructions. We all know how difficult Microsoft makes it for administrators to keep their products properly patched. There are tools to make life easier, although it has to be said that some seem to make the task of patching more difficult. Hopefully one day MS will crack the problem, but until then, depending on users to patch reliably and regularly is a strategy destined for disaster.

5) Not having an incident response plan. All networking and security professionals know that even with the best planning in the world, something will still go wrong. It simply is not possible, with today's complex environments, to be 100% secure. As luck would have it, the first major problem will come while you are on holiday up some remote hillside in Tuscany. Have an incident response plan, even a very simple one; at least it is a start. What are you going to do when a problem arises, who are you going to call for help and why-oh-why did you not print it off rather than leave it stored on a fileserver which no-one can now log into?

4) Failing to disable accounts for departed employees. You would not believe how frequently HR fails to tell IT that an employee has left the business. They might, if you are lucky, remember to ask them for their mobile phone, but hey, why not let us leave all their remote access in place!

3) Failing to configure any security on a wireless access point. We all know wireless is here to stay. But if you are going to broadcast all your company's data to all and sundry, perhaps it is a good idea to enable the basic security features that come standard with the product. It may not be the greatest, and it may be inconvenient, but it sure beats having to explain to the boss why he was able to connect to the network from the car park on his new wireless PDA, just purchased at Dixons.

2) Not keeping your firewall patched. This is pretty much tantamount to paying for an expensive lock on your front door at home and then leaving the keys in the lock - on the outside! And of course if you are going to patch the firewall software, do not forget to patch the underlying operating system if there is one.

1) Not securing home PCs with their own firewall, VPN and virus detection. It was difficult to decide what should be top of the list, but this won out. With broadband and laptops becoming widely deployed, users are accessing corporate resources from outside your logical boundary. If these machines are not properly secured, then neither is your network!

For more information contact Tom Salkield, managing director, NetConnect.

NetConnect is exhibiting at Infosecurity Europe 2004 which is Europe's number one IT Security Exhibition. The event brings together professionals interested in IT security from around the globe with suppliers of security hardware, software and consultancy services. Now in its 9th year, the show features Europe's most comprehensive FREE education programme, and over 200 exhibitors at the Grand Hall at Olympia from 27 to 29 April 2004. www.infosec.co.uk.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Unlocking Africa's AI potential
Editor's Choice News & Events AI & Data Analytics
Africa's AI market is set to grow exponentially; by investing in AI education, training, and ethical practices, African nations can harness the power of AI to transform the continent and create a brighter future for its people.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...