Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

08:46 AM
Larry Loeb
Larry Loeb
Larry Loeb

How to Panic Over IT Security

Anyone can keep calm and carry on. To panic properly takes planning. Here's our tongue-in-cheek primer on doing it right.

Most in the security field offer calm and sober analysis of security situations, looking to advise how one may avoid or survive a security-based problem. But given the "alternative fact" environment of today, that is no longer good enough. Let's consider what is needed to throw an old-fashioned hissy fit about security, and how it will make you appreciated and totally respected by staff.

More than just a river in Egypt, denial is always your first step. Deny you had anything to do with the problem, and deflect all the blame onto someone else, no matter who they might be.

A user will deny he caused it, and blame IT for the poisoned email even showing up in their mailbox. One can almost hear the cries of "Why didn't the firewall work?"

If you are IT, it's the CIO's fault. The C-level is always to blame for everything, right?

The CIO can always say the CEO or the board didn't give him enough money for a project to prevent the problem. There is bound to be a study he can pull how from somewhere showing how everything would have been fine except for those pesky vermin users.

The possibilities are endless here.

Don't worry, be happy. It's already happened and nothing can be done. Just wasting effort on worrying keeps you from your real work of doing things as they always have been done.

I mean, that's why you get paid, right?

Turn a frown upside down, and smile -- darn ya -- smile!

False confidence
It won't happen again. They tried it once and they will leave you alone now. Lightning never strikes twice in the same place.The firewall will surely keep out any bad stuff from the network.

And those vermin users won't make the same mistakes again. All that new encryption stuff will keep you snug and safe.

Isn't that what all of those best practices they make you read about are for? Magic that makes all the bad stuff disappear!

Hard lessons
Look at what you had to do to keep the auditors away from your stuff, and mark it down. You may have to use it again in the future.

Of course, some pictures from the office party when they got drunk won't hurt, either.

A true leader
Hold your head high even as those around you are hanging theirs. Stride into the room while being carried high by those disposable IT dweebs. Show the bullwhip only when it's needed to make you feel good.

You may have been completely wrong, but you look good while doing it. Spend some bucks on a new outfit just to keep up the look. Those folks in accounting totally respect the "bro" culture, let me tell you. Just ask the guys at Uber.

Proper panic requires planning and practice. How do your executives plan their panic? How do you? Let us know -- the world needs more tips on how it's done.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.