The Problem with Security Workarounds

The Problem with Security Workarounds

Never underestimate the ease at which people will find workarounds to circumvent solutions that are put in place for their security. When my son first started to walk, we fitted childproof locks in the kitchen to the cupboards and drawers. They were effective for about three days, after which he worked out how to open the cupboards, making most of the changes pointless.

The fact is that if you put obstacles in front of people, some of them will somehow find a way around them, not because they are trying to be malicious or obstinate, but in their eyes, you are just slowing them down and they just want to be efficient. Whether it is a corporate security control or parental control feature, they are often limited in scope and rely on certain conditions. By changing the conditions even slightly, often the control can be bypassed in many cases via a simple workaround.

For instance, firewall and router based internet controls only work if that is the internet connection being used. For many, it is simply a case of making a hotspot from a smartphone and connecting their computer to it via WiFi for a simple and effective bypass of all the clever filtering and security features. It is not uncommon in a strong mobile signal area, to be able to achieve a faster internet connection by tethering to a personal mobile, compared to the shared official connection.

Browser based security controls via extensions or apps similarly only work if it is installed on every browser and cannot be turned off (albeit temporarily) by the user. I once saw a store manager use a Windows based payment terminal to access the internet, despite no web browser being installed. They simply opened the built-in basic web browser that is part of HTML help. At first glance the web browser doesn’t work, but a subtle menu option allows you to enter a destination web address. Another workaround is for the user to install a new browser or use a portable app version of a web browser, though this may not always work.

Email filtering solutions that scan and restrict certain types of attachments often have a file size limit or cannot scan password protected compressed files like zip files, after which there is often an option to bypass the scan and just download the file(s). The same applies to web filters, where exceeding the size limit allows an effective bypass option. File transfer services like WeTransfer can also be used to easily bypass email size and filtering restrictions. Online remote access software like TeamViewer has for nearly two decades allowed users to share their computer with someone else anywhere in the world or take control of another computer. What set TeamViewer apart was not only was it free for personal use (which is just a tick box), but more importantly you could select run only (one time use) as an option in the installer, so it just ran in memory without needing to be installed. The result is a quick workaround to bypass firewall rules (no VPN required), with additional features like direct file transfers and unattended access. Copying work documents to a personal online storage service like Google Drive or OneDrive in order to carry on working on the documents over the weekend is another common workaround. Once online, collaboration features like shared multiple editors also become available, regardless of whether the people invited to edit belong to the organisation or have the required permissions, allowing a quick second opinion from a trusted friend or family member. Backups to personal online accounts means that losing a USB memory stick with a key presentation is no longer a major problem. In fact, having a copy of everything you’ve ever worked on seems like a good idea, for so many reasons, and if it looks like it will take too long to upload, a cheap memory will have it sorted in a few minutes.

For the end users, all these workarounds seem to be a win-win for them. Unfortunately, the end result of constantly implementing workarounds is that the various safety nets of logs, audits, filters and security controls are not available when things go wrong. When you need to prove that something was sent or received, recover via a backup or roll back to an earlier revision of a file, but it is no longer on systems under your organisation’s control. Version control issues can also quickly creep in when colleagues update the official document, while additional changes have been made to your own working version stored elsewhere.

Data protection laws could also easily be broken due to workarounds, resulting in a reportable data breach to the Information Commissioner's Office (ICO). Even worse is if an unofficial remote access is compromised through password reuse and bad cyber hygiene, data can be stolen, manipulated or encrypted and held to ransom, potentially disrupting the entire organisation. Files including malware can easily be transferred and executed, as well as accessing email contacts for phishing attacks and compromising as many systems the user has access to.

So, you can see the importance of end users understanding that there could be serious implications to their workarounds. Security is a balancing act against convenience, sometimes the balance is wrong, but there may be good reasons why certain actions are blocked or hoops needed to step through. Ironically, in many cases there are official systems available to achieve the goal the workaround was for, if they were to only ask the IT department. Always ask, don’t assume and remember that free personal online systems are not the same as the paid for business equivalents, despite appearances.

For more security resources and advice, see: www.booleanlogical.com

要查看或添加评论,请登录

nick ioannou的更多文章

  • Why Are We So Bad At Choosing PIN Codes?

    Why Are We So Bad At Choosing PIN Codes?

    Modern life is full of passwords and PIN codes, and while there is much written on passwords, there is not so much on…

  • How Many Apps Do You Think You Have?

    How Many Apps Do You Think You Have?

    Every week we are told to install updates and security patches for software on our computers, but many programs don’t…

  • How Many Computers Do You Think You Have?

    How Many Computers Do You Think You Have?

    Every week we are told to install updates and security patches for software on our computers, but have you ever stopped…

  • 12 Cybersecurity Myths You Need to Dispel

    12 Cybersecurity Myths You Need to Dispel

    Technology has always been hyped up by marketing, but when that hype spills over to cybersecurity, the end results are…

  • Cybersecurity Is Just Not Cool

    Cybersecurity Is Just Not Cool

    Let’s face it, cybersecurity has an image problem, for most end users it is dull, tedious and repetitive. A series of…

    2 条评论
  • The Security Benefits of Clearing Cookies

    The Security Benefits of Clearing Cookies

    If the phrase ‘have you tried turning it off and on again?’ is the number one IT support step, then the second step is…

  • The Security Benefits of Restarting Your Device

    The Security Benefits of Restarting Your Device

    Have you tried turning it off and on again? This popular meme originates from the TV show The IT Crowd, but that…

  • 10 Things That You Do That Help Cybercriminals

    10 Things That You Do That Help Cybercriminals

    Sometimes our actions or lack of, together with what we do online is the digital equivalent of walking down a dark…

    3 条评论
  • In a Cyber Crisis, Who You Gonna Call?

    In a Cyber Crisis, Who You Gonna Call?

    The lyrics in the song by Ray Parker Jr. for the original Ghostbusters movie, ‘If there's something weird, and it don't…

  • The Grim Reaper & Your Data

    The Grim Reaper & Your Data

    Our perception of time when it applies to how long a particular type of technology has been in our lives is a matter of…

社区洞察

其他会员也浏览了