Whispers & Screams
And Other Things

The rise of the Network Plumber

As the worlds journey through the second industrial (Internet) revolution carries on apace, todays businesses face an emerging challenge. Unless your company has its own "in-house" network professionals it is likely that the demands the Internet places on your business, whilst clearly a massive opportunity are also the source of what can seem like spiralling overhead costs in terms of personnel and knowledge.

 

Back in the mists of history during the first industrial revolution, the electric light bulb was causing a stir. The new technology was clearly a fantastic opportunity for business of the time to increase productivity and improve working conditions. It was basically a new fangled technology which could enable businesses to "work smarter".  Now where have we heard that before?

The first electricity installation companies were small bands of highly educated and highly paid technical afficionados who were evangelists of the technology rather than being more akin to the matter of fact electricians of today. The technolgy has nowadays moved from invention to commodity to utility and that process probably took 10 to 20 years to fully complete. There are a lot of parallels that can be drawn between that revolution and this one.

Heres one cast iron fact. Businesses today need networks. Whether it is to connect their towering office blocks in each corner of the world into one great corporate network or just to connect their office computers to their printer and the internet to read their emails, they all need their networks. We have tried to think of one single business that wouldnt put itself at a disadvantage in todays world by ignoring everything related to the internet such as emails and websites and we have failed. From the sole trader window cleaner to the corporate giant, all of them now need their networks.

 

 The technology is now moving into the realms of utility rather than being "a great new invention". Nowadays your average Granny in Scotland is just as likely to switch on the laptop as they are to switch on their central heating. Ok thats a dubious fact I'll concede but you get the picture. The world has changed forever and the Scottish business community as well as the residential community now need their networks. The technology is now thought of more like a central heating boiler than the hubble telescope to the average consumer. They just want it to work.

Todays networks now need plumbers. Todays Scottish businesses now need network plumbers and not the techie evangelist types of the last 10-20 years. They need matter of fact network tradespeople who they can call upon to get things working properly when they arent. They dont need an inhouse plumbing enthusiast who does plumbing for a hobby and thinks theyre a bit handy with a pipe bender and they certainly dont need a plumbing department full of plumbers in their overalls ready to fix a boiler at a moments notice. 

 

Ok weve stretched the plumbing analogy a little too far here but I believe the point is made. When it comes to network plumbing and you need the system to just work. When you need a no nonsense expert in the trade to advise you on the best systems for your requirements or just to make your existing systems do the job that you need them to do for you, day in-day out, give us a call at Rustyice Solutions. The network plumbers.

Continue reading
1245 Hits
0 Comments

How to recognise security vulnerabilities in your IT systems

As IT systems continue to extend across multiple environments, IT security threats and vulnerabilities have likewise continued to evolve.

Whether from the growing insider threat of rogue and unauthorised internal sources, or from the ever increasing number of external attacks, organisations are more susceptible than ever to crippling attacks. It's almost become simply a matter of "when it will happen" rather than "if it will happen."

For IT resellers, security issues have always persisted as critical to all communications for an organisation's IT department.

However, with the increase in the levels of access to a company's network compounded by these maturing threats, it is no longer feasible to merely recognise the existence of more simplistic, perimeter threats.

Resellers must be able to provide customers with a comprehensive risk assessment of the entirety of an organisation's IT assets to their vulnerabilities--inclusive of both software and hardware.

This risk assessment must incorporate an understanding of external threats and internal vulnerabilities and how the two continue to merge to create increasingly susceptible IT environments.

At the most basic level, organisations and resellers alike must understand the different types of threats. Malware, a generic term for malicious software, such as trojan horses, worms, and viruses, is the most common form of attack that is originated by an external hacker. Malware attacks have persisted for years - from the infamous Morris worm to common spyware attacks - and they remain the easiest and most damaging tactic deployed by malicious hackers.

With enterprises extending to the cloud, and more organisations adopting SaaS-based applications, social media and other Web 2.0 tools, damaging malware attacks and viruses can now originate through simple SPAM messages and emails.

Internally, organisations are typically susceptible to threats from either authorised rogue users who abuse privileged accounts and identities to access sensitive information, or unauthorised users who use their knowledge of administrative credentials to subvert security systems. It is this type of vulnerability - unauthorised internal access - that has continued to emerge as the most volatile and disruptive.

To truly understand the risks involved with these "insider threats", organisations and resellers need to understand the root of the vulnerabilities.

Most commonly, the risks lie with the use of embedded credentials, most notably hard coded passwords, a practice employed by software developers to provide access to administrators during the development process. The practice occurs frequently since application developers tend to be more focused on the development and release cycle of the application, rather than any security concerns. While it may appear harmless at first glance, it is extremely risky as it can potentially provide unauthorised users with powerful, complete access to IT systems.

To compound the matter, by hardcoding passwords to cover embedded credentials, vendors create a problem that cannot be easily fixed nor assuaged by tools such as Privileged Identity Management systems. Once embedded into an application, the passwords cannot be removed without damaging the system. At the end of the day, the passwords provide malicious outsiders with a bulls eye target - a key vulnerability to leverage to help them gain powerful access and control on a target device, and potentially throughout the entire organisation.

One of the most well known examples is the Stuxnet virus. We've all been blown away by the design of Stuxnet, and were surprised by the pathway the virus took in targeting SCADA systems. Reflection shows that the virus used the hard coded password vulnerability to target these systems - which should serve as a lesson for all businesses.

The existence of vulnerabilities embedded within these types of systems is not necessarily new, but the emergence of new threats continues to shed light on the ease with which they can be leveraged for an attack. While malicious outsiders and insiders have focused often on the administrative credentials on typical systems like servers, databases and the like, in reality, IT organisations need to identify every asset that has a microprocessor, memory or an application/process. From copiers to scanners, these devices all have similar embedded credentials that represent significant organisational vulnerabilities.

While steps can be taken to proactively manage embedded credentials without hardcoding them in the first place - Privileged Identity Management tools can help - the onus is on the organisation, and the reseller, to ensure that a holistic view of all vulnerabilities and risks has been taken.
Continue reading
680 Hits
0 Comments