Week 6: Hardening Users Against Social Engineering
Information security professionals invest effort
and capital in building robust technical solutions and policies to harden our
networks against attacks. However, all of this can be undone if our users aren’t
aware of the policies—or fall victim to social engineering and violate the policies
to help a “customer.” The 2019 Verizon data breach investigations report found
that 33% of breaches included social attacks, illustrating the importance of
security awareness at the basic user level.
For example, a recent Princeton study (PDF
link) found that telephone company employees regularly violated admittedly lax
company authentication policies, which allowed attackers to reassign customer
telephone numbers and bypass SMS-based two-factor authentication. This case underscores
two problems: first, that telecom policies did not adequately protect customer
account information, and second that customer service employees were too focused
on what they perceived as their core function, helping customers resolve
issues, without understanding the security implications of what they were
doing. The former issue is something which can be resolved relatively easily: telecom
security personnel can implement stricter authentication policies, and other
services can recognize the problems inherent in tying two-factor authentication
to SMS. However, training customer service personnel to concentrate on security
is a more complex problem.
It is a truism in the information security
industry that security should be part of the system design process rather than
being added on after the fact. I propose that we go one step further by
integrating security-consciousness into the new employee onboarding process.
This extends the same principle and will cement the idea that protecting
customer information and company systems is a core part of every employee’s
duties.
Comments
Post a Comment