Monday, October 29, 2012
Differentiating mobile devices
When company management seeks to differentiate between devices and attempt to ban certain categories of device from the workplace they can often fail to realize that categories have merged and cannot easily be separated.
Apple mobile devices, for instance, all run the same operating system and apps So banning IPad tablets but not IPhones does nothing from a security, capability or risk standpoint. The same apps and capabilities exist on the phones as the tablets.
In fact, phone calls can be made from an iPad using google voice to any landline, so would that not make an iPad fit into the phone category?
If you say no then would you be classifying the IPad as a tablet on a mere size basis ?
Phones are getting bigger. The galaxy note 2 phone is 5.5 inches. The new iPad mini is only 7.8 inches and has a cellular radio option available. The ipod touch is only 4 inches but has no cellular radio. Which is a phone and which is a tablet ?
I would argue that the whole phone / tablet differentiation is bogus as tablets can have the same operating system , hardware and uses as a phone.
Trying to restrict tablet use only serves to alienate a subset of workers and show managements lack of a true understanding of modern mobile devices.
S. Russell Dyer BS CNE CISSP CRISC Security+ CICP
Mobile device Guru.
Friday, October 26, 2012
The wire is the key
The wire is the key to enterprise security. Whoever owns the wire holds the keys to the kingdom. Make sure your network security department has the tools to " own the wire".
The majority of Data leakages and breaches happen over the wire, and the wire is what we must maintain a laser focus on.
Sure, log correlation can yield valuable information in a post breach scenario, but the real time relevancy if the traffic on the wire far outweighs the patch detain of server, workstation and device logs.
Think if the fox in the henhouse. Does the farmer want his first alert of trouble to be screaming gens getting slaughtered or would he rather see the fox approaching across an open field and gave time to prevent the slaughter.
This is why a system that monitors the traffic on the wire is an enterprise imperative. Such s system can be a hard sell to executives, as it may not be a regulatory requirement, or helpful to external auditors focused on logs and reports. But the seemingly high cost of such a system pales into insignificance alongside the financial and reputation costs of even a small data breach.
So the enterprises should invest in network monitoring software which can show, alert, and capture, traffic on the wire. This allows the information security teams to identify, intercept and prevent breaches.
All information security teams prefer Prevention of breaches, but are often limited by prior management funding and system acquisition decisions to post breach analysis.
That's all for now
S. Russell Dyer BS CNE CISSP CRISC Security +
Location:Okemos Rd,Okemos,United States
Wednesday, October 24, 2012
BYOD 5 Commandments
Monday, October 22, 2012
<img src="file://localhost/var/mobile/Applications/FD73DEEB-8A71-487D-B1D3-4E05250BB76A/Documents/BPImageUpload%20Image%20Uploads/2A5E0112-AC43-4F8B-95E3-103C66784DE3">Liar on the wire
What makes work suck
Sunday, October 21, 2012
Winston Churchill quote
1) “Success is the ability to go from failure to failure with no loss of enthusiasm.” Winston Churchill, former prime minister of
<img src="file://localhost/var/mobile/Applications/FD73DEEB-8A71-487D-B1D3-4E05250BB76A/Documents/BPImageUpload%20Image%20Uploads/30DBFF4E-F2B1-4328-8D39-8EE221C6CA86"> Enterprise security 10 commandments.
1. Define a security policy
This is the document which governs all data security within the company. Some tips? It shouldn't be too lengthy (no employee is likely to engage fully with a fifty page document); it should not demand the impossible; and it should show that you value your employees. (A further recommendation: have an executive or the HR department deliver it, rather than IT support.)
2. Make use of security technologies
These are the basis for the security of the company's data/information. A network that does not have antivirus protection, firewalling or antispam will be exposed to too many risks for other controls to cover adequately. According to data presented in the ESET Security Report Latin America, 38% of enterprises in the region were infected with malware last year.
3. Educate your users
Moreover, educate all your users. Technically adept users or the IT Department are often not included in security training, as if it were proven that they are less vulnerable to threats. According to ThreatSense.Net statistics, 45% of the threats detected in the region last year made use of social engineering, which against which technical but security-unrelated expertise may offer no defence at all.
4. Take control of physical access to information
Information security is not a problem that should be considered only in terms of "virtual" information, but should also consider the physical media where it is stored. Where are the servers? Who has access to them? Without a doubt, physical access is crucial. Printed data should also be considered in this respect. For example, physical access to offices where confidential information is held (Management, accountants etc.) or where there is access to printers (someone could take "accidentally" see or steal confidential information).
5. Maintain your software
Software vulnerabilities are the gateway to many attacks against the organization. According to the report on the state of malware in Latin America, 41% of USB devices are infected and 17% of the malware used exploitation of vulnerabilities. Keeping the operating system and other applications up to date with the latest security patches is a vital security measure.
6. Don't just rely on IT to defend your systems
One of the most common security errors is to fail to understand that security is not purely a technological problem. There should also be a team whose sole purpose is to manage information security, and this should be given full consideration rather than ignored in favour of issues such as usability and convenience. Security is not the only business need, but it is important.
7. Don't give ordinary users administrative rights
If users don't have administrative rights they don't need, the impact of an intrusion into the system will be limited. Once again, we should emphasise the importance of implementing this control for the entire company: members of the IT department and senior management should also have limited privileges for day-to-day computer usage, using administrator accounts only where the job in hand requires them.
8. Think before you sacrifice security to save money
Security should be designed to protect business information and, therefore, the business. When investing in security, take into account the value of the information that is to be protected, the likelihood of a breach, and the likely consequences of such a breach.
9. Don't finish a security project
That may seem a strange thing to say, but it isn't, because you shouldn't start a project either. Security must be seen as a continuum, not a process with a fixed start and end point. It is true that small implementations of security controls may need to be implemented as projects, but general protection of information protection should not be perceived as a project, but as a continuous process and ongoing business requirement.
10. Don't underestimate the importance of information security
Our last and possibly most important point is to urge you to understand the importance of well-protected busines information. One of the worst mistakes that an executive can make is to thinking that a control should not be implemented because "I don't think I happen". Many companies, especially small and medium-sized enterprises, may not recover from a severe information breach.
Monday, October 8, 2012
Low cost event correlation
Thursday, October 4, 2012
An issue of Priorities
What's in a Cube
Friday, September 28, 2012
<img src="file://localhost/var/mobile/Applications/FD73DEEB-8A71-487D-B1D3-4E05250BB76A/Documents/BPImageUpload%20Image%20Uploads/661415F9-7463-4BE1-818F-191EB6481557">Metrics vs Productivity
The Best Defense
Wednesday, September 26, 2012
Epic Fail
Friday, September 21, 2012
Personal Mobile Devices in the Enterprise
Thursday, September 20, 2012
Scan Everything
Securing the network
Sunday, September 16, 2012
The election approaches
The Democratic incumbent openly supports abortion and gay marriage, while testifying to being a Christian.
The Republican challenger is a Christian, but Mormon and not baptist. He republicans are also closer to big business than I would prefer.he Republican challenger is a Christian, but Mormon and not baptist. He republicans are also closer to big business than I would prefer.
When November comes Ill vote Republican because I'm a bible believing baptist and the bible says that thou shall not kill, and marriage shall be between one man and one woman.
Monday, September 10, 2012
Greenfield village<span id="selectionBoundary_1347236102968_5678466688841581" style="line-height: 0; display: none; " class="rangySelectionBoundary"></span>
Monday, August 27, 2012
ICloud - a double edged sword?
iCloud - a double edged sword
Enter the Corporate conundrum !
Wednesday, August 8, 2012
Wednesday, March 14, 2012
Political mess
In a perfect world we would have a PAC free and lobbyist free Washington. You wouldn't need 50 or a hundred million dollars to run for president, and we would have more than 2 options to vote for.
Yet alas, we are destined to get either another 4 years of a speech maker who can't deliver and supports the killing of unborn babies and disenfranchising of all Americans who aren't from a minority. Or we get a rich out of touch businessman who will fail to tackle corruption and will look the other way as top business executives rake in way more money than they deserve as they increase profits by eliminating workers and reducing benefits for everyone except themselves.
All we bottom feeders can hope for is to make it to retirement with a few saved pennies to live on.
Friday, February 17, 2012
Smart password box
The password box knows the first character of your password or a key character.
When you need to enter a password, you can type erroneous characters but as soon as you hit that key character the box knows your real password is being entered.
So anyone observing couldn't know what your actual password is. Would that be possible ? I think so.
Location:Okemos Rd,,United States
Thursday, January 26, 2012
Thursday stuff
Location:Okemos Rd,,United States
Tuesday, January 24, 2012
IPhone 4s remove jailbreak
Boss wants my work phone back to stock. Said jail breaking is illegal, which it is not - google jail breaking iPhone legal.
And against corp cellphone policy, which it isn't mentioned in the policy and there is no official policy.
Anyways, Bosses boss doesn't like it so it's back to stock.
:-(
I will miss sbsettings.
-Posted from my IPhone 4S
Monday, January 23, 2012
iPhone 4S Jail break
My iPhone 4s us now sporting cydia and SBsettings.
Just google 4s jailbreak.
-Posted from my IPhone 4S
Friday, January 13, 2012
Xoom ICS
It's very stable also.
-Posted from my IPhone 4S
Location:Okemos Rd,,United States
Weather
-Posted from my IPhone 4S
Location:Okemos Rd,,United States
Friday, January 6, 2012
Microsoft smart play
Location:Okemos Rd,,United States