Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

04:06 PM
Curtis Franklin Jr.
Curtis Franklin Jr.
Curt Franklin

Security Must Stand Up to Bullying, Harassment

Today's IT security is about much more than data loss. It's time for the security group to embrace its role in protecting the people within the organization.

How far does enterprise security go? The news of late has been filled with stories of employees behaving very badly toward other employees. The real question is whether any of that behavior is a problem for the IT security group.

Back at the Black Hat conference in July, Alex Stamos, Facebook's chief security officer, gave a keynote address in which he made a compelling case for treating cyber stalking, bullying and harassing as an IT security problem rather than just an issue for HR.

The argument for involving IT security in these human behavior issues has several components; the behavior involves computers and networks, the victims and perpetrators are both using computers, and computer security has (or should have) as one of its goals the idea of minimizing the harm done to the organization by computers and their users.

When IT security takes on abusive use of its systems, several changes in thinking are required. The first change is from searching for traffic that damages the organization's data to looking for traffic that might damage the employees. The next is a change from being on guard primarily for technology-based attacks to guarding against behavior-based threats. But the foundation change is expanding and enhancing the definition of "harm" so that any of this matters to the IT security team's mission.

The most valuable asset
One of the catch-phrases of the modern business era is that data is an organization's most valuable asset. Well, that's when corporate management isn't telling potential and current employees that peopleare the organization's most valuable asset. If we just say that people and data are an organization's most valuable assets then it's a straight-forward path from there to a position where IT security should be watching after the safety of both.

IT security is already keeping an eye on behavioral issues; just about every company now trains employees on ways to safeguard data and equipment when traveling or opening strange email messages. The security group will often amplify that with technology that looks for ill-considered user behavior and protects the organization to some extent from its effects. From a strategic point of view it's a relatively small step from those actions to protecting users from bad behavior.

A most pervasive problem
Recent revelations make it clear that harassment, bullying and intimidation are far more common than most men were willing to admit -- women (and, in similar situations, individuals who are members of minority groups) have known about these horrible behaviors all along, even when organizational structures made it all but impossible for victims to talk about them. While much of the bahvior happens IRL (in real life, or face-to-face) the electronic trail that we've seen in several of these very public cases proves that IT is involved as the means for bad behavior in many instances.

IT can rightly take credit for many developments that have made organizations more effective and brought diverse viewpoints and experiences more fully into the business world. It's time for IT security to step up to protect those voice and the people who carry them so that all of us can continue to safely and confidently move forward.

Related posts:

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-11-27
janus-gateway is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
PUBLISHED: 2021-11-26
This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via C...
PUBLISHED: 2021-11-26
@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious...
PUBLISHED: 2021-11-26
Backstage is an open platform for building developer portals. In affected versions the auth-backend plugin allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other se...
PUBLISHED: 2021-11-26
There is a Potential Zip Slip Vulnerability and OS Command Injection Vulnerability on the management system of baserCMS. Users with permissions to upload files may upload crafted zip files which may execute arbitrary commands on the host operating system. This is a vulnerability that needs to be add...