Comments
On Security Awareness Training
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
nannasin28
50%
50%
nannasin28,
User Rank: Apprentice
4/16/2013 | 3:00:03 AM
re: On Security Awareness Training
they have no other sane alternatives.- AMS1117

Scizyr
50%
50%
Scizyr,
User Rank: Apprentice
3/25/2013 | 7:17:43 PM
re: On Security Awareness Training
I have never been a fan of Dark Reading.- My initial impressions when I first discovered it was that it was filled with a bunch of hacks who don't really know what they are talking about.- I'm glad to see my first impression was justified.-- Because Bruce doesn't know how to properly train people or care to become better at training we should all just give up on education entirely.- Don't bother teaching your kids to look both ways before crossing the road, that will ruin the fun they have playing in traffic.

In response to Bruce's direct question to the readers: "Have you ever met an actual user?"
Yes, I work with end-users daily as part of my responsibilities.- I am unfortunate to be employed by a company with hundreds of employees that has no training program in place and it is solely my responsibility to mitigate security risks.- In the few years at this position I have dramatically decreased the amount of viruses and phishing attacks by having one-on-one conversations with the end-users, explaining to them simple things they can try to detect these things.- They aren't technical and they don't learn quickly like technically-minded people but it gets them thinking about it and soon they start learning on their own.- Now they contact me when they see something suspicious on their computers.

This is just one example where very brief, low-level training has very clear and measurable benefits.-

If you really want to know why the InfoSec industry is in such a desperate state, look no further than the author of this blog post, employed as a "chief security technology officer." Bruce Schneier, may your reputation be forever blemished for authoring such nonsense.-
pjhillier
50%
50%
pjhillier,
User Rank: Apprentice
3/21/2013 | 11:42:12 AM
re: On Security Awareness Training
I particularly enjoyed Dr. Gary Hinson's response to this tripe:-http://blog.noticebored.com/20...

On a personal note, I suspect poor Bruce isn't getting enough attention lately.
KMA01
50%
50%
KMA01,
User Rank: Apprentice
3/20/2013 | 9:09:44 PM
re: On Security Awareness Training
Obviously you don't know much about IT security and never had to deal with phishing and social engineering.
EGALLAGHER240
50%
50%
EGALLAGHER240,
User Rank: Apprentice
3/20/2013 | 8:38:42 PM
re: On Security Awareness Training
From personal experience (at a previous employer) I dropped our virus counts over 200% in the course of a year by providing simple training/tips on a continual basis to my users.- (not just once a year, train, sign off and forget)- I did it via emails every week or so about the latest attack vectors and general security topics.- Once you get the users interest and buy-in, the rest is easy.- Published a few years ago via an article on searchsecurty.com.- http://searchsecurity.techtarg...
solardalek
50%
50%
solardalek,
User Rank: Apprentice
3/20/2013 | 8:32:10 PM
re: On Security Awareness Training
You wrote: "If four-fifths of company employees learn to choose better passwords, or not to click on dodgy links, one-fifth still get it wrong and the bad guys still get in."

I disagree with this. -When the "bad guys get in" among the untrained, they're typically serving ads and sending spam. -More serious attacks CAN be detected and prevented with adequate training. -Successful non-fatal attacks may even encourage the untrained to seek training that will help them prevent more serious attacks in the future. -

More:-
http://tinyurl.com/bshcdvn
DougShieldsSecurity
50%
50%
DougShieldsSecurity,
User Rank: Apprentice
3/20/2013 | 3:48:02 PM
re: On Security Awareness Training
If the US government had taken this same defeatist-attitude regarding healthcare, we would not have affected smoking rates in this country over the years. -We have. -Also look at the buzz generated by the movie SuperSizeMe. -Employee behavior modification is the goal and it can be done effectively. -You just need the right program to get employees to think before mindlessly clicking on links, making Facebook posts, bragging about IP in a bar, etc..
slimjim00
50%
50%
slimjim00,
User Rank: Apprentice
3/20/2013 | 3:23:30 PM
re: On Security Awareness Training
I disagree. Whether you're a developer or Joe (End-Loser)
user itGs your job to be aware and cognizant of these daily threats and the
Security Engineers to inform and educate them.-
The problem of being Social Engineered is systemic from ground zero.

I think to do nothing for and just count Joe User
completely out of the picture is a sure recipe for failure.- After all Security is ever so changing and
will always be a layered approach.- After
all the End Loser is your weakest link, right next the lazy coder or
developer.- Right?
stefragre
50%
50%
stefragre,
User Rank: Apprentice
3/20/2013 | 1:23:13 PM
re: On Security Awareness Training
Aside from the obvious, Bruce is right about something else, change your passwords/phrases regularly....-
brunes
50%
50%
brunes,
User Rank: Apprentice
3/20/2013 | 12:43:37 PM
re: On Security Awareness Training
The one part of this I disagree with is the notion that we should be-designing-systems that force you to choose long passwords. This is already too big a problem today on the internet. I don't care if jo-schmo-blog-101's site is-compromised- so I should not be forced to create a long password there. Simmialrly, guess what, I don't really care much if someone hacks into my hulu account. The number of accounts on the internet that I actually care if they were compromised (because they store personal data that I care about) are very few and far between. Yet, EVERY website thinks that they are important enough that they need to be an iron vault.

Rather, online passwords should be obliterated, or used sparingly. Sites need to make more use of the federated identity systems of Google Twitter OpenID and Facebook. I should not need to have 150 different usernames and passwords, all of which are possible attack vectors, to use the internet. And if you are running a site and refuse to do this, then I certainly should not have to choose a 8 character alphanumeric password to post-pseudo-anonymously-on a blog like this one.

Forcing people to create ever-more complex passwords to access low-security data simply makes the problem worse and worse because people then re-use those passwords on multiple sites because they have no other sane alternatives. And then ONE of those sites is compromised, making ALL of the other sites compromised, some of which MAY be storing important information. Whereas if the user was allowed to use crappy one time passwords on these unimportant sites, it would not be a problem. Or even better, just allow login with OpenID or Google or Facebook.
Page 1 / 2   >   >>


More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.