DNC Hack Serves As Cautionary Tale For IT Pros - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
DNC Hack Serves As Cautionary Tale For IT Pros
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/30/2016 | 10:08:57 PM
Re: Who Hacked the DNC?
@vnewman: Or, if you're Snowden, a place to hide out.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/30/2016 | 10:08:17 PM
Re: Who Hacked the DNC?
tl;dr: Sounds like it's a matter of picking between government conspiracies and corporate conspiracies.  ;)
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/24/2016 | 9:00:14 PM
Re: Who Hacked the DNC?
@vnewman2: One interpretation that I think is a valid one (as far as any speculation goes) is that certain pundits believe that a HRC administration bears a non-negligible risk of creating or exacerbating a "Cold War II" with Russia, whereas Trump has demonstrated a favorable attitude toward Putin and Russia's leadership -- and, accordingly, if Russian powers-that-be see it that way too, they may have acted such to advance their diplomatic interests.

That said, security expert Bruce Schneier has noted that if it was Russia (who is the most likely suspect at this point), in leaking these emails they're broadcasting to the Obama Administration that they have a wealth of emails and other information going back to 2013 -- and therefore are implicitly "threatening" that if the Administration sanctions them, there will be retaliation in the form of more leaks and revelations of yet more damaging information.


Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/23/2016 | 10:44:09 AM
Re: Who Hacked the DNC?
To be fair, more has been done with less -- particularly where nation-state-backed hackers are concerned.

And those who associate with Hillary Clinton have been subjected to hacks before with no "inside help."

My only point: Could have been an insider, but it could also not have been.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/1/2016 | 7:23:03 AM
Re: Hack 'n sack knack
@Faye: You're very welcome!

Personally, I usually prefer new comments first, but sometimes I prefer to go into threaded view to follow particular conversations.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
8/1/2016 | 7:21:53 AM
Re: email matters
@Michelle: Additionally, even without that actively anti-IT but still laissez-faire culture, if someone does cross the IT line and then something bad happens (e.g., keeping proprietary business information on a personal device -- which then becomes lost, stolen, or otherwise compromised), the employee in many organizations is placed between a rock and a hard place: the employee could report the incident and risk getting in trouble, or the employee could say nothing -- putting the business at risk.

The answer, again, though, comes down to culture -- as I observed here: enterprisenetworkingplanet.com/netsysm/minimize-shadow-it-damage-by-encouraging-self-reporting.html
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Author
7/31/2016 | 9:15:13 PM
Re: Hack 'n sack knack
@Faye: Newest comments first is the default, but you can get threaded view.  At the top of the comments section page, you have the option to click Newest First, Oldest First, or Threaded View.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Author
7/28/2016 | 10:42:30 AM
Re: Breeches and Delusions of Security
@Technocrati: ...Which leads to an important lesson that many security professionals don't think of: Don't be a target.

And this goes to the whole business -- not just security.  For example: A few years back, when Sony sued that kid -- a hacker -- for IP infringement just for tinkering with his PlayStation, they absolutely should have expected to get slammed the way they did for months by hacktivists.

Anticipating hacking/breach fallout is now a part of regular risk analysis for business decisions.  The CISO needs to have a seat at the table like a "big-boy" C-suiter.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
7/27/2016 | 5:55:31 PM
Re: Who Hacked the DNC?
It is worth noting that officials are still officially referring to this as a "leak" and not so much a "hack."  The NYT and others are still referring to the notion that it was a hack as "unconfirmed speculation."  (And a leak/insider attack isn't so far-fetched, considering the circumstances.)

All we definitely know for sure?  WikiLeaks got a hold of the emails and released them.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
7/27/2016 | 5:52:06 PM
Re: email matters
@Michelle: The key, of course, is to do this in a way that is still respectful -- and perhaps even a little apologetic and/or deferential.  Otherwise, you run the risk of what I've seen happen in other organizations: The staff is well-trained, but they come to resent and disrespect IT and all its security measures -- resorting to workarounds, Shadow IT, etc.
Page 1 / 2   >   >>


The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Slideshows
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
News
Time to Shift Your Job Search Out of Neutral
Jessica Davis, Senior Editor, Enterprise Apps,  3/31/2021
Commentary
Does Identity Hinder Hybrid-Cloud and Multi-Cloud Adoption?
Joao-Pierre S. Ruth, Senior Writer,  4/1/2021
Register for InformationWeek Newsletters
Video
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll