Small Business Defense – Plans and Flexibility
- At December 10, 2009
- By Josh More
- In Business Security
- 0
In the event mentioned yesterday, the business was utterly without power. This sort of event had never been planned for, and since we were a technology company, all of our client information was inaccessible due to the outage. Inbound phone and Internet was down.
In that particular case, I believe we all looked at one another, shrugged and pulled out some snacks and started playing poker while we waited for power to be restored. (It was a very small business and we were all fairly young.) After a while, one of us got the bright idea to call the phone company and set up a temporary redirect of calls to some of our cell phones. Someone else carried the workstation that doubled as a fileserver over to a neighboring business so we could fire it up and get the client contact information, so we could start calling out to let people know about the situation.
We wouldn’t connect to the remote systems via modem, but we had decent memories and it worked out OK. The clients were understanding and while we lost some productivity, it didn’t impact us too badly.
Which, really, is the point of this. We in the security world like planning and mitigation. We like it a lot. We might even like it a bit too much. See, it’s not all doom and gloom. Sometimes, bad things happen, and it all works out OK.
In a large enterprise, you have a complex infrastructure that has a lot of moving and inter-related parts, and if there is a massive failure, it’s simply not feasible to shut it down or move it. The financial cost of such an outage can get into the millions of dollars, so it makes sense to devote some resources to coming up with recovery plans. It can take months to build one and then more months to implement it. Then you have to test it.
In small business, you may not need to do this. Should you? Probably. However, not having a solid plan isn’t the end of the world, it’s just more risk. Just as in the rest of the business, you can look at risk vs reward. It often doesn’t make sense to have a full plan that covers details for floods, fires, tornadoes and Godzilla attacks. If your infrastructure is small enough, your employees are good enough and your customers friendly enough, your plan can just be “if bad stuff happens, we’ll figure it out”. It’ll probably be OK.
However… it just might make sense to look at what you need to be flexible. Are your people really as good as you think? (Can you test this?) What about availability? If you rely on your people, how are you set for disasters that impact people? What if the backhoe had hit a gas main and some of your employees were injured during the disaster? (Or, more prosaically, suppose I had banged my head trying to get out of my dark “office” and been unable to accept incoming calls?)
So yes, by all means, avoid the tedious planning that no one wants to do. Bet your business on your people (which, really, you do every day anyway)… just be sure that your people will be able to do what you’re asking of them.
There’s more value in DR testing than just testing the systems, after all.
Small Business Attack – Backhoe
- At December 09, 2009
- By Josh More
- In Business Security
- 0
Yes, you read the headline correctly.
Several years ago, I was working as a web developer and security admin for a small development house. We were located at one end of a nondescript building in the middle of a tiny little town. One day I’m working and suddenly everything goes dark.
And by “everything”, I mean everything. My office was the same as the server room, it was lit by a single overhead fluorescent and the glow of a few monitors and lots of little blinky lights. When the backhoe doing sewer work hit the main line, everything went dark and I was suddenly sitting in a tiny little pitch black room rapidly rediscovering my latent claustrophobia.
Luckily for me, I had a cell phone that could double as a flashlight in such a situation. I found my way to the door and met the rest of my coworkers to find out that the entire building was without power, Internet and phone. Business was at a complete standstill.
We were dead on the Internet. No one could reach us. And all of our clients were running that day’s production.
What could we do?
Security Lessons from Nature – Natalids and Stargate Universe
- At December 08, 2009
- By Josh More
- In Natural History
- 0
So, I’m reading a book on the mammals of Costa Rica. (Why? Because it’s more interesting than watching Stargate Universe, that’s why. (Which says a lot about the quality of storytelling these days.)) In the chapter on bats, I ran across a mention of a natalid organ.
“That’s funny…”, I thought. “I’ve never heard of that!”
So off to the Google I go, to google about and, as it turns out, waste a good hour reading about bat taxonomy. (Which is still better than watching Stargate Universe!) Here’s what I learned:
There are these bats, see, that have an organ. It’s more than one species, it’s in a lot of them… but no one knows what it does!
- Discover Life reports that the cells may be sensory or secretory.
- Novel Guide tells us that it’s bell shaped and can cover the entire muzzle (though Answers.com suggests that that’s not always the case).
- Brain Museum implies that the presence of the organ may be linked to the lack of a nose leaf. (What’s a nose leaf, you ask? Go research it yourself, I’m busy with natalids.)
- Bob’s Bat Cave, despite having perhaps one of the coolest names on the Internet, indicates that the organ is below the skin on the forehead, though other sites place it at the back of the muzzle. (This seems like a conflict to me, but perhaps I don’t know my way around a bat’s head very well.)
- Lastly, Animal Diversity gives us the useful information that only Natalids have natalid organs. Of course, the group of bats known as natalids are defined as those bats that have natalid organs, so that information is less useful than it may initially appear.
I might have learned more, had I given J STOR $19 for the full article, but let’s face it, I’m just a Stargate fan who is oddly distracted by bats, and it would be unwise to give my bad research habits free rein.
So what is all of this doing on an I.T. security blog? I haven’t the faintest clue… and that’s the important thing. The number one biggest threat out there isn’t the mysterious Chinese hacker of the organized criminals writing malware. The most dangerous threat is that of poorly-documented legacy systems. These systems exist on every business network I’ve seen. They lurk in the dark corners, staring at admins and, well, do something… I think… maybe. These systems are dangerous because:
- We have to keep them running.
- We don’t know what they do.
Most people therefore, set them on the network and proceed to ignore them until they break. Maybe all they do is serve a few static web pages. Maybe, though, they process proprietary data. However, since we don’t know, we can’t pick an appropriate method of securing them.
We can’t turn them off, because it might harm the business, just like we can’t go up to random bats and remove the natalid organ. If we don’t know what it does, we often can’t take the risk of killing the business (or bat) by removing it to find out. (Just like we can’t take the risk of not trying the new Stargate series, as they might be awesome as SG1 (though, admittedly, history has not born this out)).
We can look deeper into the systems and possibly get an insight (“hmm, it’s kinda slimy, but it also looks like it might be a detector”). We can ask those that use it what they use it for (which might be more effective in your coworkers than it is on bats). Or, we can just name it and leave it alone (“well, it’s gotta be there for a reason, right?”)…
Which works until someone like me comes along and thinks “what the heck is a natalid organ?”, and starts digging into the problem. Because at that point, you have to justify one of two likely scenarios:
- Why you kept a legacy system running and consuming resources when it serves no valid purpose to the business.
- Why you failed to adequately secure and plan migration paths for a business-critical system.
Really, it’s probably better to find out what it does and document the thing. Luckily, we have technologies now that allow us to record inputs and outputs and clone systems, so the process should be a lot less messy than dissecting the muzzle of a bat or figuring what on Earth the producers of Stargate Universe are thinking.
Mythic Monday – Love and Creation
- At December 07, 2009
- By Josh More
- In Mythology
- 0
There is a Persian creation story that goes much the same way as the usual creation myth. First, there was nothing, then there was a god (Ohrmazd). The god made stuff and then people. Then the people screwed up.
People screwing up is really a common theme in myth, when you think about it. Maybe that says something about life?
In this case, though, the type of the screwup is a bit different. There’s nothing here about wanting to the equal of the gods, disobeying orders or even just desiring to be more than they are. Instead, the people wind up having children (a popular activity). Then since they can’t bear to be separated from their kids, they eat them.
Ohrmazd the creator god is understandably surprised at this turn of events. What’s interesting is the solution. Knowing that the people just love too greatly, he reduced their love by 99%.
(As an aside, it’s worth noting that the Persians did a lot of interesting mathematical exploration and that this is the only myth I know of that uses numbers like this instead of something like “reduced their love as if love were water in the cap of an acorn, and when emptied, the moisture that remained was as the love that remained within the man the woman”. Are the two related? I don’t know, but it’s interesting.)
With the amount of love they could feel, reduced, the people were able to have children and let them live long enough to have children of their own. Thus, did humanity prosper.
Now, in the original, this was but a small piece of the story of creation (which also involved a devil and a bull, much conflict and blood and all the fun stuff you find in creation myths). However, for our purposes, it is enough.
There is a lot of talk in the business community these days about the power of love. I have no doubt that there is something there. If you love what you do, you can do it without feeling the burden. You can more easily justify risks and you can share the load by letting your love inspire others. However, there is a dark side.
The same love that makes it easy to get started on a project is what makes it hard to stop. Love can get you through the boring 20% of the work that takes 80% of the time. However, it’s not so good at allowing you to stop when you get to 100% complete. I’ve seen projects that fail because the quest for perfection goes too far. I’ve seen businesses falter and fail because the founder loves it too much to allow it to change.
That form of love is stifling, and while it’s becoming more acceptable to recognize the harms of excessive love within personal relationships, it’s still not well considered within the business world.
This is the sort of emotion that makes security practitioners secure things for the sake of their being secure… they’ve fallen in love with the idea of “security” instead of “protection”. There are many ways to protect an asset. Keeping out the bad guys is but one.
It’s a tough balance, I know. We have to love enough to keep us going in the face of incredibly difficult odds and constantly changing threats, but then, once a project is complete, reduce our love by 99% and allow our project to continue on without meddling with it and destroying it in the process.
While learning to let go is difficult and messy, if we’re lucky, we can do it without the massive quantities of blood and death that the Persians seem to have required.
Small Business Attack – Mobile Defense
- At November 12, 2009
- By Josh More
- In Business Security
- 0
As mentioned yesterday, mobile devices are a pretty big threat. In fact, it’s so obvious to those of us in security, that we often wonder why we don’t see many attacks along this vector. Of course, that all changed this past weekend. Now that we’ve had one that got media attention, there will be more… and they’ll be trickier.
So how do you defend against them?
The easiest way is to forbid such devices from accessing your network. This can be done by limiting access on the perimeter to various services. However, this won’t do anything if someone either:
- Brings their device to their workstation and does a manual sync.
- Has proprietary data on the phone that can be accessed by an attacker.
So it’s a bit more complex than that. Some people solve the problem by giving all employees a standard mobile device. IT is then responsible for maintaining the device and making sure that it’s secure. This model is pretty much the same as workstations. It balances the business’s control against the employee’s desire to be accessible.
Others say that the mobile device is the employee’s responsibility and invests in technologies that allow greater auditing capabilities. This way it doesn’t matter what attack vector is used, the data itself is protected. It allows maximal flexibility for the employee, but does require that the audit technology be reasonably layered so that a failure in one spot doesn’t expose everything.
The real risk is when a business does neither. If mobile devices are allowed access, but not controlled or protected, and there is no internal audit process, an attacker can waltz right in and take what they want, all while some employee somewhere is distracted playing their iPhone Ocarina.