Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    Who Can You Trust?

    Written by

    Larry Dignan
    Published March 1, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Monitor-maker ViewSonic did not see this one coming.

      A network administrator it once employed was arrested last month for hacking into the monitor-makers network and wiping out critical files.

      It could have been worse. The former employee, Andy Garcia, 39, of Montebello, Calif., could have been more destructive. He also was charged with possession of a semiautomatic assault weapon.

      The arrest occurred roughly two weeks after Garcia was terminated last year. Relatively speaking, the break-in was a walk in the park, considering he was “in charge of several computer servers and had access to system passwords for management employees,” according to the Department of Justice.

      With layoffs and tough economic times giving rise to more disgruntled professionals, information technology executives are now facing this fact: Background checks are the first line of defense against harm to servers, networks and communications infrastructure.

      Security firm Kroll Inc. recommends that the checks include drug screening, psychological examinations, credit reviews and securing of federal and local crime records, particularly for positions where changes can be made to applications and system operations.

      Walnut, Calif.-based ViewSonic couldnt say much about the Garcia case. A spokesman said “all of our employees are background-checked,” but wouldnt elaborate on the stringency of those checks. Assistant U.S. Attorney Wesley Hsu couldnt comment on whether Garcia was initially screened.

      Why the emphasis on background checks? Although hack-attacks from outsiders get the press, the real damage comes from insiders. “If you look at the attacks in volume, 70% of them come from outsiders, but the 70% that cause damage are insiders,” says Gartner Inc. analyst John Pescatore.

      Indeed, a 2002 Computer Security Institute survey said 80% of respondents acknowledged financial losses from computer breaches. Forty-four percent were willing and able to quantify those losses, putting them at $455.8 million.

      ViewSonic was lucky, since Garcia only precluded the companys Taiwan office from accessing data for a matter of days. It could have been worse. Two warnings from the U.S. National Infrastructure Protection Center (NIPC) last month urged key industries such as telecommunications, finance, utilities and industrial plants to be wary of “insider personnel” that could use employers—and their networks—to make political statements, commit cyber-crime, or worse, bolster terrorism.

      To defend against such activities, the government suggested updating antivirus software, increasing user awareness and stopping suspicious attachments at the e-mail server. But a better route may be to create a comprehensive plan to figure out which of your potential new employees may have a proclivity to creating harm, for political or other personal reasons.

      Data on screening technology workers is scant, but Pescatore estimates that background checks have more than doubled since the Sept. 11, 2001 terrorist attacks to about 20% to 25%.

      A tight job market also has given employers more leverage to demand background checks for all kinds of hires, both salaried and contract.

      The main objective should be to eliminate what Alan Brill, senior managing director of tech services for Kroll, dubs “invisible” workers—full-time or temporary employees that have access to customer, human resources or financial systems, but whose interactions with computer systems go unnoticed. “Your system does not care if you get a W-2 or not,” says Brill.

      Barbara Blair, CEO of CyberStaff America, says her technology-staffing firm conducts stringent screening, including criminal and credit checks on workers.

      “Its protection you need because its not a laissez-faire world anymore,” says Blair.

      Protecting Civil Liberties

      Protecting Civil Liberties

      Not all companies want airtight security. Worries about civil liberties, unfair “profiling” of workers and reducing employee morale are all common reasons to justify going light on background checks.

      Andy Evans, senior security engineer for Ecora Software of Portsmouth, N.H., notes the background checks that Kroll advocates could be viewed as excessive.

      “At the very least you call references, but beyond that Id be offended if there was too much digging around even though theres nothing to find,” says Evans.

      He believes the amount of checking should depend on a workers mission. “For people with access to financial and personal data, though, it makes sense.”

      For Evans, a better approach is to establish clear network guidelines of acceptable use, educate employees and then enforce those guidelines. According to analysts, these guidelines should start from the assumption that the employer has a right to inspect anything on the network.

      “There shouldnt be any veil of privacy,” says Brill.

      Besides network basics such as prohibitions on pornography, sending spam and downloading pirated software, analysts say most executable files should be stopped from entering or leaving the network. There also should be guidelines on what types of employees get certain access privileges.

      Evans recommends that firewall protection should apply to both incoming and outgoing network traffic even if it results in a slower connection.

      “You can take a performance hit, but the payoff is huge,” adds Evans, who says the effect on network performance would depend on a companys hardware and bandwidth.

      Password management also is a key consideration. Passwords need to be changed often and need to stay away from obvious words such as “secret,” a spouses name and social security numbers.

      “The fact remains security is still 90% password-based and its a notoriously weak form of authentication,” says Derek Brink, director for product management for RSA Securitys SecureID.

      One major security hole: passwords that arent terminated when employees are. “When an employee leaves, all access accounts should be disabled. That closes a huge hole,” says Pescatore.

      RSA has been pushing the use of hardware and software tokens, which change passwords every minute and require a personal identification number to verify the user. Once a user is authenticated, he will get access to parts of the network hes authorized to use.

      So why arent tokens a big hit? Passwords come cheap and identity-management tools can take a piece of the budget. The cost to acquire and deploy a password system is essentially zero.

      For 25 RSA users, Steve Stasiukonis, the owner of Secure Network Technologies of East Syracuse, N.Y., says it costs $3,950 for a license to RSAs access-management server, $1,000 in annual maintenance and $62 for each SecureID fob, which will last three years.

      Brink says RSA and its rivals have largely pitched authentication as a way to mitigate risks, but dont necessarily try to prove theres a return on the investment. “Weve had a hard time talking about reducing costs and increasing revenue,” says Brink.

      And what if you take all the necessary precautions and an insider still goes bad? The key is to monitor—and more importantly interpret—network traffic.

      “Inside the firewall theres a lot of information to interpret,” says Brill. “Most attacks leave a trail. The only problem is seeing the trail.”

      Indeed, its a trail that can leave reams of data. Out-of-the-ordinary financial transactions, executable files, unusual Web site visits and instant-messaging conversations should all raise red flags, say analysts.

      Brill says decision-makers have three choices. Dont monitor your network and take your chances; devote resources to interpreting the data full time; or outsource to companies such as Symantec, which acquired monitoring firm Riptech last year.

      Pescatore also says startups such as Vericept, SilentRunner and Niksun are working to fill the monitoring void by offering software that cooks traffic patterns down to a simple alert.

      “The key is to collect the data [and] rebuild 1,000 events into one incident,” says Pescatore.

      What You Should Do

      Checking Backgrounds”>

      What You Should Do Checking Backgrounds

      • Be consistent

      Conduct thorough background checks on part-time, full-time and contract workers.

      • Dont go it alone

      Use legal and human resource departments to find available records, from all sources. Implement checks.

      • Follow traffic signs

      Monitor your network for unusual activity and server requests.

      • Look inside
        Most security is focused on attacks from the outside.
      Larry Dignan
      Larry Dignan
      Larry formerly served as the East Coast news editor and Finance Editor at CNET News.com. Prior to that, he was editor of Ziff Davis Inter@ctive Investor, which was, according to Barron's, a Top-10 financial site in the late 1990s. Larry has covered the technology and financial services industry since 1995, publishing articles in WallStreetWeek.com, Inter@ctive Week, The New York Times, and Financial Planning magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×