Bringing cybersecurity into the mainstream

The corporate world is taking security seriously says Cisco’s Chief Security and Trust Officer, John Stewart

“Cybersecurity is out of the dungeon and now selling itself as a business service,” says Cisco’s Chief Security and Trust Officer, John Stewart.

Stewart was discussing his company’s security challenges at a Cisco Live briefing at their Melbourne conference yesterday.

The shift to security as a business service follows the pattern of computerisation in business believes Stewart, “at first businesses said you can’t keep important documents on computers, then they said you could only keep important data on computers”

For Stewart, the fact c-level execs recognise the importance of cybersecurity is a positive sign that indicates organisations are taking IT and communications security seriously.

When asked what keeps him up at night, Stewart said it was worries about infrastructure security, the Ukrainian power network’s experience after an attack from a seriously motivated group of hackers indicates just how serious this is.

Interestingly Stewart remains focused on the risks of security breaches, as the Internet of Things rolls out it may well be the integrity of data streams becomes a far greater focus for system administrators and security officers.

Paul travelled to Cisco Live in Melbourne as a guest of Cisco

Similar posts:

  • No Related Posts

Will the internet’s insecurities damage economic growth?

Online security problems are chronic and costing our economies billions claim researchers.

“No country is cyber-ready” warns Melissa Hathaway, author the Cyber-Readiness Report.

Hathaway’s warning is that the economic benefits of the internet are being lost to the various vulnerabilities in our information infrastructure.

Dutch research company TNO claims that the Netherlands lost up to 2% of their GDP to cybercrime in 2010 and Hathaway claims similar losses are being incurred in other developed countries.

Supporting Hathaway’s views at a function in Sydney today, Cisco System’s Senior Vice President and Chief Security Officer, John Stewart, made a frightening observation about corporate networks.

“Every single customer we have checked with, and these are the Fortune 2000, has high threat malware operating in their environment – every single one of them.”

So the bad guys are in our networks and causing real economic damage. The question for businesses and governments is how do we manage this threat and mitigate any losses?

On our more intimate level, how do we manage our own systems and online behaviour to limit our personal or business losses?

Hathaway makes the point that the internet was never intended to do the job we now expect it to do and as consequence security was never built into the net’s design.

Today, we rely upon the internet regardless of its lack of inbuilt security. With everyone from governments through to organised crime and petty scammers wanting to peek at our data, we have to start taking security far more seriously.

Similar posts:

  • No Related Posts

Ending the era of the computer password

Has the humble computer password reached the end of the line?

Earlier this year, Wired Magazine writer Mat Honan had his entire digital identity stolen from him when hackers cracked his email password and then systemically took over all of his cloud and social media accounts.

Matt writes of his experience on Wired and proposes it’s time to kill the password.

The problem with Mat’s proposal is that he doesn’t suggest an alternative.

The age of the password has come to an end; we just haven’t realized it yet. And no one has figured out what will take its place.

Every alternative authentication method to passwords has flaws just as serious, if not worse. Many are plainly impractical.

All of them, including passwords, have the common weakness that those holding the information can’t be trusted either – one of the greatest ways for passwords to get into the wild is when incompetents like Sony give them away.

Security is evolving, in the meantime we need to keep in mind some basic rules.

  • Use different passwords for different accounts
  • Only access accounts from trusted and up-to-date computers
  • Create strong passwords for accounts that matter, like online banking and email
  • Strong passwords are multiword phrases
  • Use two-factor authentication if its available
  • Don’t link unnecessary social media and cloud accounts together
  • Be very careful

We should also remember that a skilled, motivated hacker will probably break into your account regardless of your computer security. In this respect it’s no different to the physical world where a determined criminal will get you regardless of the locks and alarms on your house.

It’s also important to remember that security is more than just evil hackers; data can be damaged or given away by a whole range of means and people breaking into systems is only one risk of many.

Computer security is an evolving field and while it might be premature to declare the password dead, we’re going to see big changes as we try to lock down our valuable digital assets.

Similar posts:

Listener’s questions – ABC Nightlife computers

As a follow up to last night’s ABC Nightlife computers here are some of the promised answers to listener’s questions

As a follow up to last night’s ABC Nightlife computer spot where we looked at who owns our online data, there were a few questions which we’d get back to listeners on.

The entire show can be listened to online through the ABC Nightlife with Tony Delroy website and includes some of the issues we’d get back to listeners on, but first an apology.

Bruce Willis never sued Apple

One of the callers Mark mentioned the story of Bruce Willis suing Apple over ownership of iTunes tracks.

It turns out this never happened as Charles Arthur of the Guardian explains.

While Charles can be a cranky bugger, he’s right in this case that the media didn’t a very poor job in regurgitating an untrue story without ever checking its veracity. Luckily it’s not one that I cited in the program.

Protecting your Twitter Account

One of the topics we discussed was the threat of accounts being hijacked and Twitter is one service that is constantly being compromised because of poor policies. An important part of protecting a Twitter account from being taken over is to make sure an extra level of authentication is used by clicking the “Password Reset” option in the Twitter Account settings.

Recording online

Des asked about recording his own message for an audio Christmas card to his friends and relatives.

On Windows computers, Sound Recorder is the long standing built-in app while on the Mac, Garage Band is the built in application.

There is a free third party application available for both PCs and Macs called Audacity which also allows you to record and edit on your system.

US customer service

One interesting thing about the conversation was how many callers criticised the “US mentality” of providing lousy service. This probably isn’t true as most American businesses provide some of the best customer service in the world.

The lousy service from online companies is more a function of the computer engineering and venture capital background of the entrepreneurs setting up cloud computing and social media services, while the majority of these companies are from the US it wouldn’t be fair to brand this as being an American cultural issue.

Our next Nightlife spot is on December 13 at 10pm and we’ll be looking at Windows 8 and what type of computers should people be considering. Hope you can join us.

Similar posts:

Facebook and Families

Family use of social media can be problematic

As the Internet has become a normal part of our family lives, social media services like Facebook are becoming important in the way people, particularly our kids, socialise and communicate.

Most of this web use is positive however there are risks with these online tools so we do need to know how to manage social media services and reduce any problems we may have in our families and businesses.

Understand the risks

Facebook is an online service and all web based platforms share the same risks such as stranger danger, bullying, fraud and offensive behaviour – both kids and adults need to understand the risks.

A good start is sitting down with younger kids and using some of the online resources available, the US Virginia Department of Education has a good interactive presentation on online safety.

For Australian specific content, the Federal government’s Cyber Smart website offers advice to families at all ages; from grandparents to kids.

Respect the rules

All online services have rules that govern behaviour, one of the most common is a restriction on under 13s. This is partly because of the US COPPA law that restricts websites and social media services from advertising to children.

Of the other rules that can cause problems Facebook has bans on hate speech and an almost pathological obsession with nudity. It pay to read the terms and conditions so you know what is acceptable.

Under 13s should not use Facebook

While for many kids Facebook is the way to talk to their friends online, parents should resist the pressure to sign their kids up until they are of the legal age.

Regardless of what you think of the rules, many kids don’t have the maturity of to understand or deal with the issues of using social media sites. For that matter, neither do many adults.

Should Facebook find out that an account is owned by a child under 13, they will shut it down immediately.

Choose your friends carefully

Everybody – kids and adults – should be cautious about friends they make online. Just accepting friend requests from anybody, or from those who look cute or cool, can lead to problems later.

Set your privacy

In Facebook you should set your default privacy settings to “Friends”. You can do this by clicking the arrow pointing down in the top right hand corner of the Facebook screen and selecting privacy.

Having set your default privacy settings to Friends, you may want to further improve your privacy by continuing down the privacy screen and selecting functions like not allowing friends to post to your Facebook wall.

Be careful what you like

Liking products and pages can have consequences, at the very least others know what causes you’ve joined.

Joining hate or bullying campaigns or pages is not a good look, so don’t do it if you think you may upset people around you.

You are what you post

Anything you put online is in writing against your name. If it’s going to upset people or cause trouble then don’t do it.

In the United States one teenager found this out the hard way when her father discovered a Facebook post criticising him and her mother. He shot her laptop and then posted the video onto her Facebook page.

Practice Safe Computing

Services do get hijacked, so have strong passwords, up to date virus checkers and make sure the computer is fully up to date with security patches.

Never share passwords with friends or siblings and use different passwords on each service so if Minecraft gets compromised, Facebook or email doesnt’ as well.

Put computers in common areas

Kids’ computers should be in common areas and use of any Internet enabled devices like iPods and mobile phones in places like bedrooms should be strongly discouraged.

Be open to talking

If anyone in your family seems to have a problem with computer use such as getting upset, socially withdrawal or acting unusually then talk to them. This happens with adults as well.

One thing to remember is that punishing people, particularly kids, rarely works well with these technologies so it’s best to make it clear they won’t be in trouble if they come to you with a problem they are having on the net.

It’s not just kids

We have to remember its not just kids who get into trouble online, there’s no shortage of adults who have created problems for themselves and their families through irresponsible online behaviour. So parents need to watch their own social media usage as well.

Should someone in your family be having a problem, then don’t hesitate to talk to the school, employer or Internet provider if there’s issues that need to be addressed.

There’s lot of online services services and resources such as Cybersafe listed above. Also don’t hesitate to call any support lines such as Lifeline or Beyond Blue if you are seriously concerned about a family member’s wellbeing.

On balance, the web and social media are positive influences on most people’s lives so by using commonsense and playing safely, the majority of families will avoid the really terrible stories we hear about online problems.

Similar posts: