Advice needed on how to deal with a pr0n problem

Discussion in 'Computer Security' started by nugget, Nov 23, 2005.

  1. nugget
    Honorary Member

    nugget Junior toady

    7,796
    71
    224
    Thanks for the help guys. I appreciate it. In light of the current virus problem hitting the net at the moment, the solution I've decided on is to do a company presentation about security.
     
    Certifications: A+ | Network+ | Security+ | MCP (270,271,272,290,620) | MCDST | MCTS:Vista
    WIP: MCSA, 70-622,680,685
  2. Tahrey

    Tahrey Bit Poster

    11
    0
    26
    should drive the point home pretty nicely, if you can make sure all the suspects are in attendance... then look for the increasing numbers of guilty blushing faces as you get further through your list of causes :)

    as i've had said to me enough times... a lot of the job isn't fixing the computers, it's fixing the users..
     
    Certifications: GCSE in IT... and that's it
    WIP: ECDL / Whatever finally seems right
  3. wizard

    wizard Petabyte Poster

    5,767
    42
    174
    Ahem this presentation would have taken place 11 months ago :tune
     
    Certifications: SIA DS Licence
    WIP: A+ 2009
  4. fortch

    fortch Kilobyte Poster

    408
    21
    35
    I'm with ya, bro. My biggest problem is one of tact, and learning to pick and choose my battles. I always opt for truthfulness, but then again problems aren't always black and white. The most alarming thing here is the lack of discipline.

    Now, before anybody jumps at the anti-pr0n stance, the context of this concerns the very subject that you have stated -- the security of the laptop, both online and offline. The very fact that he's in a position of authority doesn't relieve him of being steadfast; in fact, the contrary should be the norm: he should be accutely aware of the responsibility of his position, and the information entrusted to him. This definitely includes the sensitive information on his laptop, and that transcends into securing it properly.

    Poor surfing habits, loading unnecessary software, and other misuses (clearly outlined in the company use policy -- if you don't have one, which would be a surprise, get one created) are not just something to be ignored. This is equally important in physical security as well -- not leaving it flipped up, or in a car overnight (or even stopping into a 7-11). Users are the soft white underbelly of security administration.

    I couldn't agree on this more -- this guy represents the future and livelihood of the company. Problem is, this type of behavior is being accepted. Someone's always got an excuse, and accountability is almost *never* first out of the gate. If his data is compromised, who do you think will get the blame? Yup, scarey situation, particularly because his bosses (if any) are probably techno-challenged as well. The good ole boy network has foiled many an honest worker, that's for sure.

    I'd follow the advice of others here, too. Definitely document this kind of stuff. The policy is there for a reason, so adhere to it (hopefully it exists). Like Trip, I'd take it to HR discretely, maybe even broach the subject without any names, to find out the proper course of action. Is this in a domain infrastructure? Maybe some GP tinkering or IEAK creativeness to curtail these breaches of policy -- without a direct confrontation.

    This is a bad position to be in, and I empathize. Most people look at this and say "No big deal -- you're making a mountain out of a molehill." Yeah, right, that's what they said about Enron. Lack of accountability invites many things, most of which pertains to excluding oneself from any rule deemed unnecessary. My motto? Better safe than sorry.

    EDIT: Great idea on the Security Presentation -- knock all the birds out with *one* stone!
     
    Certifications: A+,Net+,Sec+,MCSA:Sec,MCSE:Sec,mASE
  5. Bluerinse
    Honorary Member

    Bluerinse Exabyte Poster

    8,878
    181
    256
    So how are things now Nugg?
     
    Certifications: C&G Electronics - MCSA (W2K) MCSE (W2K)
  6. Mitzs
    Honorary Member

    Mitzs Ducktape Goddess

    3,286
    85
    152
    I'm up for the presentation. A very deep and consist one. Show them what hacker do and how they do it, then show them what it cost a company when hackers do find there way in. Also let it be know that why they do have IT people in place to protect and keep their network running smooth. The security part can not be guaranteed with out the employees coperation. Everyone has to particapate when it comes to security. Make sure they do understand that there is more to security then you pushing a button and barrier is formed around the network.

    What? You get in shiny little car turn the key and go? No you put gas in it, when it needs new tires you change them, when you go so many miles you change the oil. When a bell starts dingging you have someone look at. You think because you hear antivirus and firewall, no one can get in? If goverments around the world can be hacked you don't think corporation cans? What the hells the matter with you man? Do you not watch tv at all??????

    wheew I feel better now...
     
    Certifications: Microcomputers and network specialist.
    WIP: Adobe DW, PS
  7. Kitkatninja
    Highly Decorated Member Award 500 Likes Award

    Kitkatninja aka me, myself & I Moderator

    11,143
    559
    383
    I've been faced with this problem where upper management had certain "stuff" on the laptop. Luckly we had already implemented user agreements/code of conduct which staff members had to sign.

    Anyway when this was found, we actually spoke to the offending manager in private and just said to be careful on who he let use he laptop as we found "material" on it. That way we didn't accuse him and at the same time we gave him a "scape" goat route just in case it really wasn't he's fault. A week or two later we sent round a memo informing staff that laptop were being audited automatical for "licensing purposes" and that this audit scanned the whole computer and on the odd occasion IT Services were recalling various laptop as a surprise phyical audit, of course we put it down to FACT and how we are complying with them :twisted:

    Funny enough we had no more problems with that certain stuff anyway...

    -Ken
     
    Certifications: MSc, PGDip, PGCert, BSc, HNC, LCGI, MBCS CITP, MCP, MCSA, MCSE, MCE, A+, N+, S+, Server+
    WIP: MSc Cyber Security

Share This Page

Loading...
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.