Education is key to security

May 2011 Cyber Security

It is not always the newest technology that secures the enterprise.

Hi-Tech Security Solutions spoke to David Jacoby, senior security researcher, global research and analysis team at Kaspersky Lab on a recent trip to South Africa about the current state of the information security market.

David Jacoby
David Jacoby

Coming from a company that is on the cutting edge of cyber crime and malware (malicious software), one could expect Jacoby to speak at length about the new, complex threats facing companies today. What Jacoby mentions, however, is that companies focus too much on future threats and the latest Trojans and so forth.

“Many of the security problems we saw 10 years ago are still appearing in companies today,” Jacoby said. So, as companies are spending money on solutions to newer threats, older vulnerabilities lie unpatched and give criminals an open door, the same door they have used for years.

He adds that companies are careful in employing and training IT staff to ensure they have the needed skills in configuring their security technologies, but they often forget the easiest way into an organisation’s information is via its non-IT employees. Training employees to be aware of potential problems is key to protecting the enterprise.

All employees with e-mail access must be taught that clicking on unknown attachments or ‘emergency messages’ from their banks is inadvisable. More than that, they need to be taught what the possible consequences are and whom they can speak to if they are unsure of what to do in a certain scenario.

“We were surprised to find that in a large company in Sweden, only 10% of the employees knew what their employer produced in terms of information,” Jacoby added. Every company retains sensitive information that cannot fall into the wrong hands without causing embarrassment or creating legal problems. If employees do not know what information is out there, what should not be put at risk and how to ensure their activities do not allow a data breach, how can they play a role in keeping data secure?

Security tools are there to remove the low-hanging fruit, according to Jacoby, and companies therefore need these products in place. However, there is no tool that can change human behaviour, the only way to do this is through education.

False sense of security

Jacoby also mentioned that some users believe using Linux makes them automatically secure so no work is needed to harden their servers. “The reality is that the default configuration for Linux is no more secure than Windows or any other operating system,” he explains. “You still need to go into the system and configure it to the appropriate security settings to ensure you are actually secured.”

Many people also think there is no malicious code for Linux. This is wrong and even irrelevant as ‘drive-by downloads’ operate on any Web servers that produce HTML Web pages. This means clicking on an infected Java link or PDF file on a Linux server can be as dangerous as any other Web server as malware stored on insecure Linux systems can easily be downloaded to Windows machines and cause havoc.

Jacoby notes that compromised Web servers are an enormous problem today as people are used to downloading anything they feel like, without considering the implications. And the brand of Web server you choose makes little difference to malware writers if you have not configured it for security.

A similar scenario applies to virtualisation. Virtual servers are fast becoming the norm in data centres and corporate server rooms globally, but do those operating them know enough to keep them secure?

Protect your assets

Just as companies go to great lengths to protect their physical assets with alarms, guards and surveillance, logical assets need to be protected as well. The way to do this is to look at what you need to protect, develop the policies and procedure required to protect them and then do what is required in terms of education and tools to ensure they are enacted and maintained. Of course, you need to regularly audit these policies to ensure they remain current and effective.

Buying products is necessary, but only those products that meet the requirements identified in a risk analysis. The coolest and latest tools are fun, but not always the optimal solution for those taking security seriously.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Managing data privacy concerns when moving to the cloud
Cyber Security
While the cloud offers many business benefits, it can also raise concerns around compliance, and some organisations have taken the approach of staying out of the cloud for this reason.

Accelerating your Zero Trust journey in manufacturing
IT infrastructure Cyber Security Industrial (Industry)
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

The democratisation of threats
Cyber Security
Bugcrowd looks at some of the primary vulnerabilities the world faced in 2021, and the risks moving forward with growing attack surfaces and lucrative returns on crime.

Protecting yourself from DDoS attacks
Cyber Security Security Services & Risk Management
A DDoS attack, when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can be costly in both earnings and reputation.

Exploiting Android accessibility services
Cyber Security
Pradeo Security recently neutralised an application using Android accessibility services that exploits the permission to perform fraudulent banking transactions.

Cyber resilience is more than cybersecurity
Technews Publishing Editor's Choice Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Keeping devices in check
Cyber Security Asset Management, EAS, RFID IT infrastructure
Kaspersky patents new technology for analysing relationships between electronic devices to counter cyberattacks launched through connected IoT devices.

Considering cloud downtime insurance?
Arcserve Southern Africa Cyber Security IT infrastructure Security Services & Risk Management
Byron Horn-Botha, business unit head, Arcserve Southern Africa, reveals three vital steps that you must consider to ensure business continuity before you buy insurance.

A robust OT cybersecurity strategy
Editor's Choice Cyber Security IT infrastructure Industrial (Industry)
Cyber experts are still struggling to convince senior management to spend money to protect their control system assets, resulting in a lack of even basic measures to protect control systems.

Why Multi-Factor Authentication, universal ZTNA and Zero Trust matter
Access Control & Identity Management Cyber Security
Malicious cyber actors are experimenting with new attack vectors and increasing the frequency of zero-day and other attacks, according to Fortinet’s 1H 2022 FortiGuard Labs Threat Landscape report.