The Ostrich Syndrome
In April 2005, I was asked to contribute an article to a new professional newsletter, called Risk Mitigation Executive.Â After understanding that the target audience would be business people, I wrote this article of which I am very proud.Â Hope you like it:
The Ostrich Syndrome
It is easy to understand why Physical Security is important.Â Just last week, in my hometown of Atlanta, Georgia, a suspect killed several people, evaded police for almost a day, and nearly escaped unscathed â€“ all due to physical security policies that will now doubtlessly will be reviewed all across the country.
We find it a lot harder to understand the value of Cyber Security.Â Why?
Letâ€™s think for a moment.Â What is the value of a corporation â€“ be it a medium size business, a large enterprise, or a fortune 50 company?Â Is the value comprised of the buildings it owns?Â The machinery?Â A price tag on its employeesâ€™ heads?Â No.Â The value of any business today is the Intellectual Property it has.Â The know-how on how to make the widgets, how to advance the processes, how to get a leg up, and all in an increasingly global environment.
Where do you store data?Â Do you write it on a piece of paper?Â Do you jot it in your PDA?Â Do you type it in a computer?Â At the end, all worthwhile data is (or ought to be) stored in a computer system and backed up.
How real is the danger?
From my observation, and from data found in Symantecâ€™s Deepsight quarterly report, several clear trends emerge:
- Threats to our information integrity are getting more and more sophisticated
- More and more often, Threats can no longer be mostly attributed to any one specific category (such as â€œVirusâ€ or â€œPhishingâ€)
- Threats that take advantage of a newly discovered vulnerability are coming faster and faster on the heel of that vulnerability.Â If it used to take two weeks, now we see â€œsame-dayâ€ exploits.
What does it mean?
In my view, it means that hackers are no longer primarily the â€œscript kiddiesâ€ that we have seen in the past.
- They are better.
- They are better organized
- They are better funded
- and they have a much longer span of attention (aka patience)
It also means that many more attacks today are not just â€œsweepâ€ attacks.Â They are targeted. Targeted not just to government sites but more everyday to individual company sites. They may be our competitors, foreign enemies, or even organized crime.
Why canâ€™t we get the dollars?
Who says we canâ€™t?Â We simply have to prove our case.Â Whereas physical security incidents carry a clear and concise mention in terms of lives or dollars and cents, we (as in the entire security industry, as well as major business) have been lax in the sharing of real information in terms of VALUE of incidents.Â Whereas we have to inform the authorities in many cases of physical security breach, we shy away and fear disclosing data about REAL information security breaches.Â Even within the ISACâ€™sÂ (Information Security and Analysis Centers) established for many industries, real data about real incidents is very rare and precious.Â It is time for us to play nicely together and share information.
Further, it is time for us to stop treating information security within the context of â€œbest practicesâ€ and knee-jerk reaction.Â Best Practices are just that â€“ ideas that are the best in the specific area they address.Â If you own a parts supply store, your router security should NOT be the same as the NSAâ€™s.Â Right?
We need to grow up.Â We need to look at information security as an integral, critical part of business.Â We need to understand our own environment.Â We need to analyze our true risk.Â We need to determine our own exposure and we need to mathematically calculate our true needs.Â We can not continue shouting from the rooftops that we need more money.Â No one is getting away with it â€“ why should we?
Here is an example I like to use.Â No one likes spam (not even spammers like receiving it!)Â So, here is a multiple choice question:
- Should we invest 100,000 dollars in a spam solution?
- Should we ignore spam and learn to live with it?
- Should we conduct a survey, in our own true environment, of the real affect of spam â€“ how much disk space it uses, how much network bandwidth it occupies, what it might mean to our employees in term of lost productivity, et cetra? or
- Shall we use a â€œbest practiceâ€ and follow it to the letter?
Surprisingly, many would suggest #4.
That would be akin to instructing everyone in Georgia to wear bulletproof vests and stay in their homes.Â Would you put up with that?