Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 21 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Time to educate the digital na(t)ives.

by The Gurus
September 10, 2015
in This Week's Gurus
Share on FacebookShare on Twitter

Time to educate the digital na(t)ives.

Each and every day we learn from the news about more or less sophisticated technical hacks that enable minor or major data breaches. In the best cases responsible disclosure models are applied to avoid these hacks to be in the wild at all. Most of the known issues are fixed within a more (e.g. Firefox) or less (e.g. Apple) reasonable timeframe and patched throughout many of the relevant installations. Several are not (and I am looking at you, Android).
But weaknesses and threats are not necessarily connected to e.g. sophisticated buffer overflow / malign code executions attacks in the first place. Many issues and problems, in both personal and corporate deployment scenarios result from individual wrongdoing. Many of us can be considered to be digital natives. So we should expect them and us to behave and act as responsible digital citizens, when it comes to security, data protection and maintaining personal privacy. The truth is: they are not and this is an ongoing challenge. A few examples:

  • It seems unbelievable but spam mails and their attachments (and users still clicking on them), drive by downloads and phishing attacks by mail, skype or messenger apps are still among the top 5 cyber security threats in 2015.
  • One of the most recognized data breaches of the recent weeks did not require a sophisticated attack vector. It was the disclosure of sensitive medical data by sending a mass mail with all recipient addresses in the to: rather than the bcc: Whether this was done by accident or because of lack of experience/expertise with the mail protocol, this could surely have been avoided. Through education, through diligence and maybe through some intelligent checking in the mail client (More than 10 to:-recipients? Let’s better reconfirm the user, if this really is what is wanted.). Have you never sent a quick mail to the wrong recipient, because the type-ahead functionality of your mail client picked another recipient than expected and you didn’t check? Had some embarrassing moments because of texting or chatting with the wrong recipient?
  • Again and again weak, reused or default passwords together with the unwillingness to activate multifactor authentication are continuing to be major threats. And if one thinks he or she is safe, checking whether your account has already been compromised might be salutary.
  • Let’s be honest: We all know those “power users”, who have loads of tools installed to “unlock the hidden powers” of their systems. Those self-appointed experts who manipulate registry entries and read every tech magazine or blog to change their systems default behaviour. Who run untrusted software and cut and paste code from geek sites to the command line or the terminal. And readily run arbitrary code with admin/root access, because otherwise this great new tweak doesn’t work.
  • On the other side there are those who still run outdated und unpatched systems like XP for various but definitely no good reasons.
  • The currently discussed issues regarding devices running older Android versions which suffer from the Stagefright vulnerability is a very real problem for many users. Apart from some patching initiatives and a few devices still maintained, there is a large fraction of Android devices left with no options to upgrade or patch the system. Continuing to use them puts all personal and additionally stored data at risk and every user is responsible for that.
  • Talking about responsibility: some systems do come with an appropriate security concept and with highly reliable mechanisms for protecting the users privacy and security. Undermining these mechanisms by jailbreaking/rooting these devices to gain more “freedom” from the vendor and of course especially the freedom to run pirated software from some shady “app store” for free has just recently again been proven to be not the cleverest idea.

The saying goes: “There is no patch for human stupidity”. But the issue is not stupidity but the lack of expertise. Both digital natives and the elder ones (a.k.a. the digital immigrants) tend to be over-challenged with the technologies available through their computers and mobile devices.
Users need to be educated and made aware of risks and threats. On the enterprise level the only possible “patch” for this issue is guidance through appropriate, complete and actionable policies and, as a result, constant and well-executed training. This is one of the essential responsibilities of a CISO. Appropriate educational programs for corporate users will likely be more successful if they cover aspects of both their daily business duties and their personal privacy and security. With both aspects constantly converging  in a world of BYOD (Bring your own device) this is of increasing importance anyway.
Education and awareness are equally important on a personal and private life level, but there won’t be a regular training program. So it is up to the individual, i.e. us. If you know better (and you do), first check your own behaviour and your systems, and improve them to an adequate level. Then tell your friends and family and demonstrate it through your daily behaviour. Try to educate, they might listen. And if you are in the right position (and many of us are), try to influence your team, your colleagues, your organization.
While we are at it: If you are a developer of operating systems, apps or websites: Proper security and privacy guidance built-into your code, true end-to-end encryption, the use of open and rock-solid standards, clever sandboxing and instant security patches whenever required will be getting more and more important and recognized. A good reputation in that respect might soon distinguish you from your competitors.
 
 
Matthias Reinwarth is Senior Analyst at KuppingerCole focusing on Identity and Access Management, governance and compliance. He has consulted in the Identity Management sector since 1993. Based on a combined education in economics and IT, Matthias developed a strong background in Identity and Access Management including Identity and Access governance and compliance. Furthermore Matthias has co-authored the first German book on directory services in 1999 and has acquired practical experiences as an IAM consultant for more than 20 years. He has been successfully working in assignments across various sectors including media, government, financial, telecommunications, logistics and industry (e.g. chemistry and pharmaceutics). Matthias areas of expertise cover all major aspects of IAM including technology and infrastructure, data and entitlement modeling as well as IAM processes and governance

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Businesses must prepare for new generation of cyber risks

Next Post

DOE hacked 150 times from 2010 to 2014, report says

Recent News

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023
TikTok to be banned from UK Government Phones

TikTok to be banned from UK Government Phones

March 17, 2023
New AT&T Cybersecurity USM Anywhere Advisors Service Helps to Establish and Maintain Threat Detection and Response Effectiveness

Should Your Organization Be Worried About Insider Threats?

March 17, 2023
Guild Education controls API abuse with Salt Security

Guild Education controls API abuse with Salt Security

March 16, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information