Compromise is not a secure option

June 2017 News & Events

The past couple of months have been interesting for those in the security industry, especially cybersecurity. With thousands of computers hit by ransomware across the globe, we’ve all had a glimpse of the future: nothing and no-one is safe, and more importantly, you can’t trust those you think you should be able to trust.

The guilty parties in most of these cases were not the criminals themselves, although attacking hospitals is the kind of thing one only expects from the lowest of the low, but the government agencies who kept the software vulnerabilities that were exploited to themselves. It seems like a good idea if your goal is to make everyone in the world subject to your hacking proclivities, but it also shows an extremely immature approach to security.

That may seem like a bold statement, but I don’t think anyone with a real security mindset could believe that they would be the only ones to discover a way in, whether it’s into an operating system or a secure building. There is always some smart person somewhere who can do whatever it is you can do. So hiding vulnerabilities, in my opinion, is stupid.

It’s also very 18th century to take a huge risk in the belief that everyone will keep a secret, especially in a world where names like Assange, Manning and Snowden are held in high respect for exposing abuses of authority, even to their personal risk. As changes in the world show a diversion from the ideals of democracy and liberty that were once held aloft as the ultimate goals for every nation, more people are going to become disillusioned, look for a way to work against ‘the man’, which will result in more leaks and people doing things they think are right, even if they are against the rules.

Keeping vulnerabilities secret in this environment is unconscionable. That’s not to say they should be publicised as soon as they are discovered, but they need to be brought to the attention of those they put at risk and solutions need to be put in place as quickly as possible.

This applies to physical security as well as the virtual world where we already see companies forcing more secure practices from users (except the cheap-and-nasty brands which exist because they cut corners). Whether it is simply forcing users to change default passwords, securing backdoors and hard-coded access routes, or whatever the latest security issue is, each step towards hardening your setup is the right one to take for the vendor, customer, end user and integrator.

End users can no longer afford the luxury of waiting until it’s convenient to ensure their security is up to date, vendors can no longer take the risk of ‘saving’ security upgrades in the hope of selling it as a feature in a new version, and authorities can simply not play childish games and put everyone at risk by hoarding vulnerabilities.

As we have found out and will yet more painfully learn over the next year or two, compromising and kowtowing to criminal and anti-democratic agendas only benefits the criminals.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
Linear heat detection (LHD) from Technoswitch
Technews Publishing Technoswitch Fire Detection & Suppression Products & Solutions Fire & Safety
SecuriHeat LHD by Securiton prevails where conventional fire detectors reach their physical limits. It copes well with extreme temperatures and constantly high atmospheric humidity, while precise measurements are also possible when corrosive gases and contaminated air are present.

Read more...
From the editor's desk: A burning issue
Technews Publishing News & Events
      Welcome to the first publication from SMART Security Solutions devoted to the fire industry. In the BMI report, sponsored by the Elvey Group, released earlier this year, fire was the smallest component ...

Read more...
Effective fire and smoke detection using cameras
Hikvision South Africa XtraVision SMART Security Solutions Technews Publishing Dahua Technology South Africa Fire & Safety
Video analytics, spurred on by advances in image processing, enhanced fire and smoke detection capabilities while significantly reducing false alarms in surveillance cameras. Today, AI has further improved accuracy and minimised false alarms.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...