Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/2/2016
03:00 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail

7 Signs of Infosec's Groundhog Day Syndrome

Irritations that plague security pros day in and day out.
4 of 8

 Ineffective Training
Even though just about any cybersecurity person will tell you that people are invariably the weakest link in enterprise security, users just keep making the same mistakes over and over again to help attackers along. Phishing is just one example of the madness. 

And yet, most enterprises today do have some form of security training in place. The trouble is, that year in and year out it is the same crummy course that hasn't made a difference yet. 


'It's a guarantee that this year will still require cyber security operations personnel to conduct the same asinine training as every year on things like phishing, password security, and vain attempts at trying to defend the endpoint even though that is a lost cause and a failure of epic proportions to try,' says Chase Cunningham, director of cyber threat research innovation for Armor. 
Image Source: Adobe Stock

Ineffective Training

Even though just about any cybersecurity person will tell you that people are invariably the weakest link in enterprise security, users just keep making the same mistakes over and over again to help attackers along. Phishing is just one example of the madness.

And yet, most enterprises today do have some form of security training in place. The trouble is, that year in and year out it is the same crummy course that hasn't made a difference yet.

"Its a guarantee that this year will still require cyber security operations personnel to conduct the sameasininetraining as every year on things like phishing, password security, and vain attempts at trying to defend the endpoint even though that is a lost cause and a failure of epic proportions to try," says Chase Cunningham, director of cyber threat research innovation for Armor.

Image Source: Adobe Stock

4 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/2/2016 | 6:35:07 PM
passwords
IT usually has only itself to blame for bad user passwords.  There is no user education -- merely "policy."  As if we're likely to believe that replacing a letter with a non-alphanumeric character will magically make our password unbeatable.  As if 30-day or 90-day mandated password resets will really make us think more about security.

Either educate users on effective passwords and how to manage/remember them, or (as a last resort) simply assign them and make sure no one posts it on a sticky note on their monitor.

...but IT departments won't do that because then the blame will fall squarely on their shoulders.  ;)
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Tim Mackey, Principal Security Strategist, CyRC, at Synopsys,  6/18/2019
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12957
PUBLISHED: 2019-06-25
In Xpdf 4.01.01, a buffer over-read could be triggered in FoFiType1C::convertToType1 in fofi/FoFiType1C.cc when the index number is larger than the charset array bounds. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It allows an attacker to use a crafted pd...
CVE-2019-12958
PUBLISHED: 2019-06-25
In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in FoFiType1C::convertToType0 in fofi/FoFiType1C.cc when it is trying to access the second privateDicts array element, because the privateDicts array has only one element allocated.
CVE-2019-12951
PUBLISHED: 2019-06-24
An issue was discovered in Mongoose before 6.15. The parse_mqtt() function in mg_mqtt.c has a critical heap-based buffer overflow.
CVE-2019-10689
PUBLISHED: 2019-06-24
VVX products using UCS software version 5.9.2 and earlier with Better Together over Ethernet Connector (BToE) application version 3.9.1 and earlier provides insufficient authentication between the BToE application and the BToE component, resulting in leakage of sensitive information.
CVE-2019-12346
PUBLISHED: 2019-06-24
In the miniOrange SAML SP Single Sign On plugin before 4.8.73 for WordPress, the SAML Login Endpoint is vulnerable to XSS via a specially crafted SAMLResponse XML post.