July 1

Staying off of the suspect list

by Ron Woernerdetective

Often, we’re our own worst enemy.  We do things that make us a likely target for blame.  In other words, we’re on the suspect list.  We receive the blame when something goes wrong because of our actions or the access we maintain.

The best strategy is to keep yourself and other off of that list.  First of all, it disrupts the investigation into finding the true source of the problem.  Second, it causes others to distrust those on the suspect list, even if they’re innocent.  The best way to prove innocence is to have a clear name from the onset.

Often security professionals and IT managers have access to many systems, applications, or facilities. They believe it’s required because of their position or responsibilities.  The problem is that having access often puts them automatically on the suspect list.  Many times I’ve been accused of involvement when there were network issues.  “Were you running one of your security scans again?” is a common question aimed at me just because I have the ability to run scans, not because I necessarily did.

Often, other activities may add us to the “suspect list”, such as browsing the Internet, transferring documents from home to work and vice versa, clicking on links in email, or installing freeware or shareware applications on a work computer. While they’re not always bad activities in and of themselves, these actions do have potentially dangerous consequences.

Here are five things you need to do to keep yourself off of the suspect list:
1. Limit your access.  This is the concept of least privilege.  If you don’t need it or don’t use it every day, disable or delete your access to it.
2. Only use administrator privileges when you administer the system.  If you’re always logged in as an admin, then you’re just asking for trouble.
3. Freeware isn’t always free and shareware may mean you’re sharing more than the program.  Finding programs on the Internet may save money in the short run, but they occasionally contain hidden malware than can take down your system.
4. Think before you click.  Be aware of where you go on the Internet.
5. Keep your secrets secret.  If you allow others to use your login id or badge, then that person is you and you’ll be on the suspect list if something goes wrong. Badges and passwords are like kleenex; it’s not cool to share.

Security’s objective is to keep people off of the suspect list.  We know that the great majority of our work force wants to do what’s right.  We want to help you.  Like the police, our objective isn’t to get you into trouble, but to keep you out of trouble.  Consider what you should do to keep yourself and others off the suspect list.  It will make your life much easier.


Tags


You may also like

Are you using frameworks properly?

Leadership and communication are actually layers, not levels

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

Subscribe to our newsletter now!