You can't secure what you don't acknowledge.SM

Friday, November 7, 2008

Why your users don't buy into your policies

Here's a great quote I just came across that explains why most users aren't motivated to follow security policies.

"Without a compelling cause, our employees are just putting in time. Their minds might be engaged, but their hearts are not. Meaning precedes motivation." - Lee J. Colan

They're just not in the game...Hence the necessity for strong leadership.

Wednesday, November 5, 2008

Election-related security stories

Although I disagree with Becky's push to vote, vote, vote! (too many uninformed and non-tax paying citizens already vote and shouldn't be able to), here's a good post about some recent election/voting stories involving IT and security.

We reap what we sow

Tuesday, November 4, 2008

It's up to you....

When I got into the office this morning I looked up at this little card on my wall titled "Care". It has a quote by Ralph Marston that says "What will you do today that will matter tomorrow?"

Wow, I can't think of any stronger statement that sums up our responsibility on this big day for America...for the world. Think long-term people. The world's watching...let's hope we don't stumble.

Monday, November 3, 2008

Think all the hype over MS08-067 is just that...?

There's been a TON of talk about the latest vulnerability affecting Windows. Message boards have been lighting up with talk about it, vendors are offering webcasts, it's the talk of the security town. In fact, it's so bad that Microsoft is releasing an "out-of-band" patch to fix the problem.

So, is it worth the trouble to patch - especially on seemingly critical servers that you can't afford a patch to take down? I think so...Why? Because exploit code is out there, right now, today. Sure, there are the CANVAS and CORE IMPACT commercial pen testing tools, but malicious users on your network don't need to spend money on them. Oh no, no...the free and easy Metasploit tool has the MS08-067 exploit built in as well. All it takes is a simple download, plugging in a couple of variables, and boom - any given system on your network is at the attacker's disposal. Internal breach anyone...?