[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ISN] Four Ways to Turn Insiders Into Assets
By Robert Lemos
Dark Reading Nov 19, 2012
Jayson Street has few problems walking into businesses and getting
access to sensitive company data.
A vice president of information security for a bank by day, Street
moonlights as a penetration tester at Stratagem 1 Solutions, a job at
which he has yet to fail. At the CyberCrime Symposium in Portsmouth, NH
earlier this month, Street illustrated all the ways that attackers can
gain physical and network access to corporate computers, from tailgating
to get physical access to custom USB drives to infect workers' systems
to phishing employees to gain network credentials. He stresses that his
success is not due to his skill in social engineering workers, but the
employees lack of preparedness to handle the strategies used by the bad
"This is stuff that anybody can do with any kind of skill level," he
Companies need to stop solely focusing on preventing attacks and invest
effort in detecting when attackers have breached their systems. A good
way to do that is to train employees to better recognize threats and
respond to potential security issues in the proper way, turning worker
from liabilities into assets.
Visit the InfoSec News Security Bookstore
Best Selling Security Books and More!