Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Ignore the Insider Threat at Your Peril
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
4/8/2019 | 8:51:22 AM
Bad Practices: Turn good people into your enemy.
THE OUTSOURCED EMPLOYEE: If an employer wants to make a solid employee otherwise free of any intent at all, just outsource and have him or her train a replacement.  That breaks all bargains.  No loyalty at that point and, when a whole IT department is sent packing - alot of assets go with them.   140 walked out of one firm a few years ago and I was part of another wholesale ransack JUST to save costs.   That is worse than being fired - it is an insult. 

WE RESPECT YOU IF YOUR LEAVE BUT WE CAN FIRE IN A HEARTBEAT: Equal that with WE want two weeks notice but we can fire YOU with a phone call this afternoon.  Have a nice day.  Oh really?   I gave one day notice for that reason to an employer who did terminate staff with just one or two day notice.   Revenge pure and simple

WE'RE SORRY WE FIRED YOU. Beware terminating critical personnel too.  My daughter lost a real-estate position when the wholel firm closed, 320 laid off and among them was the IT guy who maintained asset inventory.  Well they suddenly wanted him back for a time to track non-returned inventory and ..... well he told them they could put that offer where the sun did not shine.  Result: lost inventory and assets.   

One firm I worked for fired a lawyer and turns out they needed him realy bad.  A mistake.  They invited him back.  No hard feelings.  He was not offended nor did he turn bad employee BUT HE WAS FIRED so it was time to renegotiate salary!!!!!!


97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Could you pass the hash, I really have to use the bathroom!
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12253
PUBLISHED: 2019-05-21
my little forum before 2.4.20 allows CSRF to delete posts, as demonstrated by mode=posting&delete_posting.
CVE-2019-12250
PUBLISHED: 2019-05-21
IdentityServer IdentityServer4 through 2.4 has stored XSS via the httpContext to the host/Extensions/RequestLoggerMiddleware.cs LogForErrorContext method, which can be triggered by viewing a log.
CVE-2019-12251
PUBLISHED: 2019-05-21
sadmin/ceditpost.php in UCMS 1.4.7 allows SQL Injection via the index.php?do=sadmin_ceditpost cvalue parameter.
CVE-2019-10319
PUBLISHED: 2019-05-21
A missing permission check in Jenkins PAM Authentication Plugin 1.5 and earlier, except 1.4.1 in PamSecurityRealm.DescriptorImpl#doTest allowed users with Overall/Read permission to obtain limited information about the file /etc/shadow and the user Jenkins is running as.
CVE-2019-10320
PUBLISHED: 2019-05-21
Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.