Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

08:46 AM
Larry Loeb
Larry Loeb
Larry Loeb

How to Panic Over IT Security

Anyone can keep calm and carry on. To panic properly takes planning. Here's our tongue-in-cheek primer on doing it right.

Most in the security field offer calm and sober analysis of security situations, looking to advise how one may avoid or survive a security-based problem. But given the "alternative fact" environment of today, that is no longer good enough. Let's consider what is needed to throw an old-fashioned hissy fit about security, and how it will make you appreciated and totally respected by staff.

More than just a river in Egypt, denial is always your first step. Deny you had anything to do with the problem, and deflect all the blame onto someone else, no matter who they might be.

A user will deny he caused it, and blame IT for the poisoned email even showing up in their mailbox. One can almost hear the cries of "Why didn't the firewall work?"

If you are IT, it's the CIO's fault. The C-level is always to blame for everything, right?

The CIO can always say the CEO or the board didn't give him enough money for a project to prevent the problem. There is bound to be a study he can pull how from somewhere showing how everything would have been fine except for those pesky vermin users.

The possibilities are endless here.

Don't worry, be happy. It's already happened and nothing can be done. Just wasting effort on worrying keeps you from your real work of doing things as they always have been done.

I mean, that's why you get paid, right?

Turn a frown upside down, and smile -- darn ya -- smile!

False confidence
It won't happen again. They tried it once and they will leave you alone now. Lightning never strikes twice in the same place.The firewall will surely keep out any bad stuff from the network.

And those vermin users won't make the same mistakes again. All that new encryption stuff will keep you snug and safe.

Isn't that what all of those best practices they make you read about are for? Magic that makes all the bad stuff disappear!

Hard lessons
Look at what you had to do to keep the auditors away from your stuff, and mark it down. You may have to use it again in the future.

Of course, some pictures from the office party when they got drunk won't hurt, either.

A true leader
Hold your head high even as those around you are hanging theirs. Stride into the room while being carried high by those disposable IT dweebs. Show the bullwhip only when it's needed to make you feel good.

You may have been completely wrong, but you look good while doing it. Spend some bucks on a new outfit just to keep up the look. Those folks in accounting totally respect the "bro" culture, let me tell you. Just ask the guys at Uber.

Proper panic requires planning and practice. How do your executives plan their panic? How do you? Let us know -- the world needs more tips on how it's done.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-15
SolarWinds Web Help Desk 12.7.0 allows XSS via a Schedule Name.
PUBLISHED: 2021-01-15
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A stored XSS vulnerability was identified in the prefs_smtp_psw HTTP request body parameter for the acp interface. An admin user can inject malicious client-side script into the affected parameter without any form of input sanitization. The...
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A time-based blind SQL injection was identified in the selected_folder HTTP request body parameter for the acp interface. The affected parameter (which retrieves the file contents of the specified folder) was found to be accepting malicious...
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A reflected XSS vulnerability was identified in the media_filter HTTP request body parameter for the acp interface. The affected parameter accepts malicious client-side script without proper input sanitization. For example, a malicious user...