Cybersecurity - Misinformation As a Security Problem

Cybersecurity - Misinformation As a Security Problem

Misinformation has a very political context these days - think "fake news!" The word conjures up images of horrible memes about issues with vaccinations, allegations about election fraud, and many other topics that people generally don't feel comfortable with because of the politics of them. But identifying and being resistant to misinformation is a hugely important part of cybersecurity that we don't talk about because the word has become so politicized. So please, take a deep breath, let it out slowly, and let's talk about misinformation in terms of cybersecurity without entering the realm of politics.

This country thrives on misinformation. Some of us are old enough to remember the plague of plain-text emails in the 1990's that promised you that just by reading the content of a plain-text email you had just infected your system and, often with that, the university computer network you were reading it on. Oh the joys of being one of the student employees of the IT staff fielding those panicked phone calls! And how many concerned relatives or friends shared urban legends with you about the dangers of walking alone through a mall parking lot , or not to flash your brights at someone who doesn't have their headlights on that they had gotten from a source they mistakenly thought was trustworthy. There is some strange pleasure we take in "knowing" something others don't and bursting their bubble with our knowledge. We like this so much that we often do so without recognizing the urban legend we're perpetuating is false. We even do this with information like useless tips on repelling flies - we just don't check the facts before we share these things.

Being misinformation aware is, in significant part, about critical thinking. It is the first step in resiliency against nearly all social engineering attacks:

  • That urgent message you got about a problem with your account and the funny URL it suggests you click to fix it.
  • That urgent message from the boss who needs a bunch of gift cards STAT!
  • The Facebook message to connect to somebody you're already connected with.
  • The proactive phone call from the "help desk" when your MFA push notifications are going off non-stop, where they tell you to just hit "accept" on one finally.

Thinking critically about what you're being told and what you're being asked to do in that moment - recognizing the misinformation - is step one in not making an important cybersecurity mistake. And don't get me wrong, misinformation can be very hard to detect without some real effort - nobody said security came without cost or effort.

But it goes farther than that. Misinformation can take the form of out-of-date security concepts as well.

  • Passwords as a concept are showing their age, and the advice on length, complexity, and how often to change them is all over the map. The realities are that complex passwords are important - especially in environments without multi-factor authentication, but that their very complexity also leads to their limitations. The best advice today is to deploy MFA, and perhaps relax the password complexity rules - so long as you're using MFA for everything.
  • Designing your remote access solution with a "full tunneling" end-user VPN used to be state-of-the-art security. How many organizations still think that's the bee's knees?
  • And how about the open source wars of the early 2000's? The harm we were doing to our security programs in the name of open source vs. closed source religious infighting is mostly a disturbing footnote told around IT and IS campfires to scare the kids these days. A fight, often as not, fueled by misinformation.

But we still have some pretty serious Cybersecurity misinformation out there that people still hold onto:

  • "My operating system is impervious to malware, I don't need AV/EDR software!" - While it is true that some OS's are built in such a way as to be less susceptible to many forms of malware, every operating system can be made a victim of a bad decision by the user. Now, there are systems out there that don't have traditional options for AV/EDR tools, so research what you should be doing to protect your devices.
  • "My security team keeps me safe, so I'm not too worried about my computer." - Just like Smokey reminds us that we all have our job to do to prevent forest fires, so too we all have to take responsibility for our own cybersecurity, and for the cybersecurity of the organizations we work for. This one is even more important in the current era of so much work from home. Our home networks become possible sources of attack against corporate systems (our laptops) that we need to take responsibility for the threats they may contain as good corporate citizens. Of course, we probably want to protect our personal data to, so it turns out what's good for the company is good for us - in this case anyway.
  • "I'm not a target, I don't have to be very disciplined." - While you may never be a named target, you are always a target of opportunity. We should all know this one by now. We've watched developers of small software projects have their projects hijacked to attempt to infect and infiltrate downstream systems. We've watched relatively low-level workers in companies become the Trojan horse for major incursions. We've watched all sorts of ways that average users and employees have had their user accounts become the account from which major incidents are launched.

So, check your biases. Check your sources. Check you facts. Turn those misinformation detectors up to 11, and you'll be off to a great start on keeping yourself and your organization safe from cybersecurity threats.

There, we made it through without any politics. I told you we could.

Shawn Eftink

Managed Services (incl. MSS / MDR) Strategist & Evangelist | Former Gartner Analyst | Former Soccer Mom

2 年

Wait…so I’m not just inherently safe because I only use MacBooks, iPhones, and iPads? ??♂?

要查看或添加评论,请登录

Bill Bernard的更多文章

  • No, It Wasn’t a Nation-State Actor. Really.

    No, It Wasn’t a Nation-State Actor. Really.

    Many years ago my sister’s car mysteriously broke down one day on her way to work. We towed it back home and began the…

  • New Year CyberSec Resolutions (Proposed)

    New Year CyberSec Resolutions (Proposed)

    My crystal ball finally broke in two, and my magic 8-ball is in the shop to have it's fluid flushed, so since I have no…

  • Post LastPass Breach - Real Consequences, Real Lessons

    Post LastPass Breach - Real Consequences, Real Lessons

    I ran across this article showing that just under one year on it seems that the LastPass breach is being used to access…

  • The Social Media Dichotomy - Public Privacy

    The Social Media Dichotomy - Public Privacy

    Between the renewed hand-wringing over TikTok and Mr. Musk's new side hustle as Twitter Owner and active CEO, social…

  • My Cybersecurity Wish List

    My Cybersecurity Wish List

    Dear Security Claus, I've tried to be a good Cybersecurity practitioner this year, and I know that you'll check my…

  • A Cybersecurity Thanksgiving

    A Cybersecurity Thanksgiving

    I'm not Oprah, so no list of my favorite things so you can go shopping. I'm not the President, so I won't be pardoning…

  • Okta - A Small Breach Became a Big Story

    Okta - A Small Breach Became a Big Story

    I realize that for some this didn't feel like a "small breach." And writing this, one week from the initial reports of…

    1 条评论
  • InfoSec Staffing Myths We Can't Afford

    InfoSec Staffing Myths We Can't Afford

    There are a trio of myths that are holding us back from solving for our inability to fully staff security teams. These…

    3 条评论
  • Three Thoughts on Log4j

    Three Thoughts on Log4j

    Just as we did with our deepwatch webinar last week, I wanted to take a moment to discuss the last few weeks and Log4j.…

    3 条评论
  • Working From Home: Things I Learned As I Transitioned

    Working From Home: Things I Learned As I Transitioned

    The company I work for was developed with the expectation that employees would work from home. That has had a lot of…

    8 条评论

社区洞察

其他会员也浏览了