Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security IT

What Non-Experts Can Learn From Experts About Real Online Security 112

An anonymous reader writes: Google researchers have asked 231 security experts and 294 web-users who aren't security experts about their security best practices, and the list of top ones for each group differs considerably. Experts recognize the benefits of updates, while non-experts are concerned about the potential risks of software updates. Non-experts are less likely to use password managers: some find them difficult to use, some don't realize how helpful they can be, and others are simply reluctant to (as they see it) "write" passwords down. Another interesting thing to point out is that non-experts love and use antivirus software.
This discussion has been archived. No new comments can be posted.

What Non-Experts Can Learn From Experts About Real Online Security

Comments Filter:
  • As a former expert (Score:3, Insightful)

    by Anonymous Coward on Thursday July 23, 2015 @10:53AM (#50168441)

    I've been out of the field for 10 years, but what I've learned since then is that "experts" don't care if the clients can actually use the system. AV? Take it or leave it, but for software updates, well, the cost of breaking corporate software with an update (they just took out our scheduling program for 4 days) is very measurable and affects everyone in the company, while the cost of a security incident is not nearly as measurable and doesn't affect everyone.

    If you want to win these fights, you have to present defensible numbers in units that the PHB's understand: Dollars or Euro. The cost of breaking the scheduling program is easy about 6 hours of salary for the entire fucking company due to lost productivity. The cost of cleaning up a security incident needs to be measured and presented. How much lost productivity did this cost, how much tech time did it cost, what's the cost of the stolen data, etc... IT, and security in particular, will always be a cost unless you show, in dollars, that it's worth keeping.

    • by Mr D from 63 ( 3395377 ) on Thursday July 23, 2015 @11:16AM (#50168629)
      There are different kinds of experts (applies to all areas....). There's the 'professor', that understands it all, is glad to tell you how much you don't understand it, but has never implemented a useful solution. There's the 'painter', who knows how to find it and cover it up and make it look and sound good, there's the 'mechanic', who'll go in and work on it for you, but you may not know what he really did or if he really helped you, and there's the 'mentor', who will take time to make sure you understand and can do the right things.
    • while the cost of a security incident is not nearly as measurable and doesn't affect everyone.

      Depends on the security incident. Not every security incident will necessarily effect everyone in the company, but many can. It's just matter of which one hits the company first.

      And honestly, the security incidents that do effect the whole company only greater for knowledge oriented companies.

      In the end, Security Experts have to look at everything as necessarily effecting the whole company because any little security issue could potentially become a bigger security issue - a cascading effect. For inst

      • You missed the point. Not affecting everybody means you don't know how many people will be affected, and can't calculate costs accurately. It raises the cost of information. How much does a disruption cost that affects everybody? Easy to calculate. What if it can affect any number of people, and you have no idea in advance which ones? Very difficult to calculate, and worse, it costs real money unrelated to solving the problem in order to increase your level of information and be able to make claims about th

        • This is why estimates are used. Because these costs do need to be calculated. This is the job of a security architect. Everything can be calculated to a reasonable proximity and accurateness. You aren't going to calculate everything to the last dime. You want to give the management team an idea of what they are going to lose if they decide on a certain course in relation to security. Then the management ultimately makes the decision.

    • by khasim ( 1285 )

      ... the cost of breaking corporate software with an update (they just took out our scheduling program for 4 days) is very measurable and affects everyone in the company, ...

      Where are your test systems and test cases?

      If you want to win these fights, you have to present defensible numbers in units that the PHB's understand: Dollars or Euro.

      And the core problem with estimating losses is that you are now trying to play in the realm of the PHB. You will always lose. That is because while you are spending time o

      • by Anonymous Coward

        If you don't play the game, you will have already lost. You're fighting for budget. If you don't present why you need the budget in a clear argument, you will have lost. That's why we have so fucking many incidents in compliant organizations. The value of compliance is clearly stated, generally by someone outside of IT, but the value of security is never communicated in dollars.

        The point of the numbers is not to bullshit and lie to the PHB, the point is to communicate in his language. Yes, as the IT guru,

      • Where are your test systems and test cases?

        Seriously?

      • Where are your test systems and test cases?

        This is probably a big part of the problem. People at home don't have a test system to screw around with. Even if they did, who wants to waste time doing crap like that. If the system is working now and updating it gives a chance of things breaking, don't update it. One woman they interview mentioned how she lost all her contacts in her smart phone when she updated the software. Yeah, I sure as hell would not update that any more. I don't do Microsoft updates either as safe computing gets me all the safety

        • Oh, and don't even tell me about anti-virus. That is just a CPU hog that does not get allowed on my system. If I download a cracked copy of software it will get scanned by an online scanner, but having crap running all the time that slows the PC to sludge and gives false positives when you program something is just right out!
    • by Jawnn ( 445279 )

      I've been out of the field for 10 years, but what I've learned since then is that "experts" don't care if the clients can actually use the system. AV? Take it or leave it, but for software updates, well, the cost of breaking corporate software with an update (they just took out our scheduling program for 4 days) is very measurable and affects everyone in the company,

      If routine operations (and updates should absolutely be part of a routine) break production you're doing it wrong. The answer is to test changes before committing them to production. The answer is not to forgo needed security updates.

    • by Anonymous Coward

      Most of the "security experts" I've met in the course of various security audits have been people that have no understanding whatsoever of how the systems they are examining work. Can they recite requirements of PCI 3.0 certification? Sure. So they have any idea how those are applied in a specific environment? Usually no.

      We have had auditors make requests that would significantly reduce our security so they could tick a box, due to lack of understanding of how things work.

      I've also bet my employer that afte

    • I've been out of the field for 10 years, but what I've learned since then is that "experts" don't care if the clients can actually use the system.

      I'm not sure that this is strictly true but I think "experts" run up against the problem that "ordinary" people don't believe they will be the target of random attacks so end up having to take a belt and braces approach. "Nobody is going to bother to attack MY account so I can use 'password' as my password."

      At the weekend my ssh server came under sustained distrib

    • by ebvwfbw ( 864834 )

      Not true. If your production environment is set up correctly, you have a development, test and production setup. Dev and test guys don't get to touch the production stuff. I've been doing that for around 30 years. No problem. Those that don't, problems.

      Let's be real here. Most companies don't care about security. For windows most of them will do the updates. For Linux, Solaris, (your favorite brand Unix) - often never. They forgetaboutit. Even then, almost all the time it's the windows box that gets hac

  • How, not what... (Score:5, Insightful)

    by QuietLagoon ( 813062 ) on Thursday July 23, 2015 @10:57AM (#50168471)
    I would have also liked to have seen the differences in how each group does what they do.

    .
    For example --- software updates:

    - do the experts use "custom" installs to avoid the installation of unwanted browser toolbars and adware, and that is why they are more likely to install updates?

    - do the non-experts use the "default" installs, which pull in toolbars and crap adware, leading the non-experts to avoid updates?

    I think the article is a good one, but there should be some more depth to it.

  • by gestalt_n_pepper ( 991155 ) on Thursday July 23, 2015 @11:01AM (#50168507)

    Any system that depends on users doing the right thing has ALREADY failed.

    1) If it's difficult or complicated, users won't do it.

    2) If your security organization's working strategy is, "break stuff, walk away and tell the user it's their problem," your strategies will be subverted from within so users can get actual productive work done, for which *they* get *their* bonuses.

    In short, users need productivity to get their extra money. Security people need a lower number of intrusions to get theirs. These two goals are always at odds, mostly because current security strategies burden nontechnical, uninterested users.

    The solution, which security people hate to hear, is to get better at installing and maintaining multiple levels of firewall, application sandboxing and/or streaming applications for all office applications, improving intrusion detection and dynamic virus removal in real time. NOT training users not to download suspicious executables or engage in fantastic feats of memory regarding passwords.

    • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Thursday July 23, 2015 @11:16AM (#50168627)

      NOT training users not to download suspicious executables or engage in fantastic feats of memory regarding passwords.

      Don't depend upon a user's memory. Tell them that it is GOOD to write down their passwords AS LONG AS THEY STORE THEM WITH THEIR CREDIT CARDS.

      The solution, which security people hate to hear, is to get better at installing and maintaining multiple levels of firewall, application sandboxing and/or streaming applications for all office applications, improving intrusion detection and dynamic virus removal in real time.

      The REAL problem with security is that the VENDORS do not place a priority on it.

      It isn't that we hate to hear that.

      We're already DOING that. But it doesn't help much when a CxO installs some infected software on his laptop (which he can because he is so important that he NEEDS admin-level access) and then brings it into the most firewalled section of the network.

      Right now I'm focusing on knowing when a site is compromised rather than trying to get EVERYONE to follow the best practices EVERY TIME on EVERY SYSTEM.

    • by Anonymous Coward

      The solution, which security people hate to hear, is to get better at installing and maintaining multiple levels of firewall, application sandboxing and/or streaming applications for all office applications, improving intrusion detection and dynamic virus removal in real time.

      All of those things are worthless with a user base that does not respect and actively subverts security. It is like being a doctor of a morbidly obese patient that gets angry and screams when you tell them they need to lose weight. There is only so much doctors can do with patients insistent on killing themselves.

      There is only so much security people can do without the users taking responsibility too.

      • by Anonymous Coward

        > All of those things are worthless with a user base that does not respect and actively subverts security.

        Framing the situation that way is a mindset that guarantees catastrophic security failure.

        Good security helps users to do their job securely. Bad security makes it harder for users to do their job securely.

        Recognize that getting the job done is the end goal and make the secure path the easiest path for the user to take and they will stop trying to subvert security.

        • by Anonymous Coward

          That is a mantra that is repeated by everyone except those that actually are trained in security practices. Without trust there is no security. Security is not a product you can buy. You can't just hire a security expert, give them an office and suddenly you are secure. No. It takes work. It takes everyone.

        • > All of those things are worthless with a user base that does not respect and actively subverts security.

          Framing the situation that way is a mindset that guarantees catastrophic security failure.

          Hear hear! The user base doesn't actively subvert security unless security is obtrusive and overbearing. Subverting security is too much effort.

    • by mlts ( 1038732 )

      You pretty much nailed it. The good thing is that we have plenty of tools to help with compartmentalizing info, to the point where it is almost surprising to see them not used.

      If it comes to a pissing contest of users versus IT security, the users will eventually win, either by cunning, or just telling PHBs they can't do their jobs... and if it is a guy out of sales who is making the numbers, the PHBs will listen to that guy almost certainly, since they view security has having no ROI, but the "quarterback

    • The solution, which security people hate to hear, is to get better at installing and maintaining multiple levels of firewall

      Firewalls are not a solution. They're a small piece of a solution, but that's all. Firewalls segment networks, which is good because it reduces the scope of the attacks that have to be considered, but any good security design should assume that attackers will be able to get onto any network that has users.

      application sandboxing and/or streaming applications for all office applications

      Even better, move all applications to the web, so everything runs on central servers which are much easier to manage and secure than a fleet of personal computers. Give users Chromebooks or another thin client configuration and don't let them install software.

      improving intrusion detection

      IDS is good, but primarily for reducing the duration of an intrusion and trying to estimate the scope of the damage. IDS almost never reacts quickly enough to stop an intrusion.

      dynamic virus removal in real time

      Preventing the installation of viruses is far better than removing them.

      NOT training users not to download suspicious executables

      If the users can't install and run what they download, then it doesn't matter what they download.

      or engage in fantastic feats of memory regarding passwords.

      Totally. Most enterprise password policies are ridiculous. High-entropy passwords are neither necessary nor sufficient for securing systems. Multi-factor auth is more secure, and makes it possible to set reasonable password policies. Say, eight characters, alphanumeric, maybe require one non-alphanumeric symbol. Annual rotation is good, unless there is some reason to believe the password may have been compromised. Users can deal with that.

      Three-factor authentication is great, and not actually all that difficult. One factor is the password. Another is some sort of one-time password generator or, even better, a USB dongle that requires user activation (OTPs can be phished -- a user you can social engineer into giving you their password will also give you an OTP, in fact it's even easier to phish an OTP than a normal password). The third is a client-side digital certificate installed on the machine after verification that it complies with corporate security policies. Use Puppet or similar to not only keep the machine up to date, but identify if it gets out of date and if it does, revoke the certificate.

      Another crucial key to successful security is single sign-on. I can remember one moderately good password easily. Require me to know several and I'll have to write them down or reuse the same one everywhere. If I reuse the password we have none of the security benefits of multiple passwords and all of the password management headaches. So users should have one, strongly-secured, account that crosses all company systems. This is another benefit of web apps over local applications: You can secure all of your web apps behind a single set of authentication credentials by deploying them behind a reverse proxy server. That server handles authentication and provides a signed, time-limited user ID token to the systems it fronts.

      • Even better, move all applications to the web, so everything runs on central servers which are much easier to manage and secure than a fleet of personal computers. Give users Chromebooks or another thin client configuration and don't let them install software.

        This is presumptuous. You're a security guy. You don't know enough about the myriad and varied work the company's employees do to make birght-line rules about how they must do it. Nor will you with any amount of training.

        • Even better, move all applications to the web, so everything runs on central servers which are much easier to manage and secure than a fleet of personal computers. Give users Chromebooks or another thin client configuration and don't let them install software.

          This is presumptuous. You're a security guy. You don't know enough about the myriad and varied work the company's employees do to make birght-line rules about how they must do it. Nor will you with any amount of training.

          You're presumptuously assuming that I don't understand that there are exceptions.

          The approach I recommend will, however, work for the vast majority of employees, assuming the necessary apps exist or can be built (or front-ended... ick, but it sometimes is the best option). Then, with the majority use cases out of they way, the security team can turn their attention to dealing with the special cases -- isolating them, locking them down to the degree possible and monitoring what can't be locked down. Or, in

    • agreed.
      I think the goal is really to limit the impact of a user being stupid and being compromised.
      A good security policy with very tightly monitored separation of duties and least privilege is a good starting point.

  • by Anonymous Coward

    As much as people want to believe, in the age of unattended Windows updates and package managers, that updating is painless and causes no problems, there are many [bloomberg.com] famous [arstechnica.com] examples [forbes.com] of times people installed updates [state.gov] that proceeded to destroy or seriously disrupt [techcrunch.com] operation of production environments.

    • I didn't see anywhere in the article that the security experts suggested blindly installing updates without testing them first.

      • by Actually, I do RTFA ( 1058596 ) on Thursday July 23, 2015 @12:52PM (#50169407)

        Sure they do. They tell non-experts to install updates. When's the last time you heard about someone's grandmother testing a patch?

  • In the paper, the authors reported that experts recommended using anti-virus software more frequently than using a password manager.

    If I were to make recommendations to a novice user, the first would be to use anti-virus software followed by anti-malware and I would guide them to Major Geeks.

  • by Atrox666 ( 957601 ) on Thursday July 23, 2015 @11:12AM (#50168597)

    Here's what you can learn from this security expert. If you click on those attachments we told you not to click on it will take me 2 days with your laptop to "analyze the threat" if you get infected. If it's not the first time then we were unable to recover your files and it will take 3 days.

  • by pla ( 258480 ) on Thursday July 23, 2015 @11:14AM (#50168613) Journal
    Although the password keeper point struck me as interesting, I take issue with the "experts" stance on updates.

    People don't shun (non-OS) updates because they "might" install malware - They shun them because they do install unwanted tag-alongs (if not outright malware). Flash tries to install its partner-of-the-week every time you update it. Chrome just added push notifications. Java... Let's not even go there. And let's not overlook the fact that most users can't tell a legit update prompt from a drive-by installer.

    Security experts have a bias here because they:
    1) can usually tell the legit updates from the bogus ones (and know enough to get the bloat-free version of the update); and
    2) can themselves remove or repair the occasional spyware that slips through, without needing to pay BestBuy $150 for five minutes' work on a machine only worth $300 in the first place.
  • by Voyager529 ( 1363959 ) <voyager529@yahoo. c o m> on Thursday July 23, 2015 @11:15AM (#50168619)

    Experts recognize the benefits of updates, while non-experts are concerned about the potential risks of software updates.

    "Experts" are much better equipped to work around an update that makes a mess, and "Experts" are better able to pick up UI changes than "Non-Experts". Security is a good reason to update/upgrade, but every non-expert I know whose phone got the Lollipop update described it with obscenities, and would have been perfectly fine with a 'security patch only' update. The problem is that there's no consistent way for non-experts to know whether this will be a "transparent security fix" kind of update, or a "this will f'k up my s't and rearrange everything for no good reason" update. Even updates that don't make a mess of the UI cause other problems. Windows XP, circa 2001, needed 256MB of RAM to run acceptably. by the end of its run, the UI hadn't changed, but somehow, it required at least 1GB of RAM when it was (supposedly) the same OS. Admittedly an obscure example (but the only one I can think of at the moment), an Intel wireless NIC driver update I did once removed the ability to specify my own MAC address. A router firmware update I did once notably decreased the throughput of the network traffic it was processing. We all remember the Slashdot outcry when Sony removed OtherOS from the PS3. "Update" has a long history of having mixed impact on end users, so any "Expert" who both unilaterally applies updates and doesn't understand why "Non-Experts" don't share this practice may well have a thorough understanding of computers, but a piss poor understanding of humans.

    Non-experts are less likely to use password managers: some find them difficult to use, some don't realize how helpful they can be, and others are simply reluctant to (as they see it) "write" passwords down.

    Many password managers use Teh Cloud (tm). There's a damn good reason to be reluctant to store all of your passwords on somebody else's hard disk. Local password managers solve that problem, and now we're back to the classical problem of 'backing data up' and 'single point of failure'. Even at that, who do you trust? Heartbleed was a particular mess from a PR perspective because Open Source ("More secure than Microsoft!!11") had a spectacular failure that was used by "Experts" - people who were supposed to be putting security at the forefront. If such a widely circulated OSS project could have such a problematic bug, what possible hope does a regular user have with respect to betting on the right horse? Even if they do, there's nothing that they can do for the far end doing stupid things - all the password managers in the world won't change a blessed thing if the password was for Sony or Ashley Madison. It's all risky at some level, and ultimately, password managers overcome a shortcoming of computers themselves. Non-Experts have things to do. Writing passwords down in a nondescript password book, kept in a room separate from the computer itself, with each of the passwords changed annually, is probably the simplest and cheapest way a non-expert can put themselves comfortably in the third standard deviation.

    Another Iteresting thing to point out is that non-experts love and use antivirus software.

    As well they should. Antivirus software is a layer of security, and one that non-experts tend to use more consistently than any other form of threat mitigation. It's not a cure-all (more likely the problem that exists with non-experts using AV software; they throw caution to the wind under the assumption that the antivirus will protect them), but it will be very difficult to convince me that properly updated AV software does more overall harm than good.

    • Antivirus software is a layer of security

      AV software may be a layer of security; but it often adds more security holes than it closes. Overall, AV software generally is more of a placebo than anything else. You can actually solve the issue better by being more security aware and careful to start with.

      • by WallyL ( 4154209 )
        I've actually stopped using AV software on my personal computer systems. Sometimes I install a firewall, but AV hasn't done a blessed thing for me in over a decade. Maybe because I'm an experienced computer user (power user?; wouldn't say I'm an expert), I know how to avoid problems from sketchy websites and have changed my router passwords.
      • by sims 2 ( 994794 )

        I actually installed McAfee AntiVirus Plus 2015 on a computer for someone last week as per usual it could not detect anything...also would not install until i removed the adware inserting web proxy that was installed on the computer i don't know why they don't offer a offline installer

        i think its a awfully expensive placebo...and the computer runs slower now without the ads than it did before with them..thats always a plus

        • Well, McAfee is definitely more placebo than others; even Norton detects stuff here and there. Kaspersky and ESET are my go-to pair, though Security Essentials isn't the worst scanner in existence, either. Typically, I find that Norton DNS + NOD32 + AdGuard tends to keep the computers of my friends and family clean with a solid amount of consistency.

          • Well, McAfee is definitely more placebo than others; even Norton detects stuff here and there. Kaspersky and ESET are my go-to pair, though Security Essentials isn't the worst scanner in existence, either. Typically, I find that Norton DNS + NOD32 + AdGuard tends to keep the computers of my friends and family clean with a solid amount of consistency.

            So aside from the performance hit you take by adding all those applications, you've also increased the footprint of security issues as each of those have issues regarding security that you must now also monitor, not to mention the backdoors that can be taken advantage of.

            The open source ClamAV is listed among the best products for detecting viruses last I checked it was one of the top three; McAfee hasn't been on that list in ages. That said, the APIs and drivers they insert into the kernel to work (and

    • "Experts" are much better equipped to work around an update that makes a mess, and "Experts" are better able to pick up UI changes than "Non-Experts". Security is a good reason to update/upgrade, but every non-expert I know whose phone got the Lollipop update described it with obscenities, and would have been perfectly fine with a 'security patch only' update. The problem is that there's no consistent way for non-experts to know whether this will be a "transparent security fix" kind of update, or a "this will f'k up my s't and rearrange everything for no good reason" update. Even updates that don't make a mess of the UI cause other problems. Windows XP, circa 2001, needed 256MB of RAM to run acceptably. by the end of its run, the UI hadn't changed, but somehow, it required at least 1GB of RAM when it was (supposedly) the same OS. Admittedly an obscure example (but the only one I can think of at the moment), an Intel wireless NIC driver update I did once removed the ability to specify my own MAC address. A router firmware update I did once notably decreased the throughput of the network traffic it was processing. We all remember the Slashdot outcry when Sony removed OtherOS from the PS3. "Update" has a long history of having mixed impact on end users, so any "Expert" who both unilaterally applies updates and doesn't understand why "Non-Experts" don't share this practice may well have a thorough understanding of computers, but a piss poor understanding of humans.

      I didn't see any experts in the article suggesting blindly installing updates without testing (if possible, like in a corporate environment for instance) or reading the release notes. Anyone with the technical skill to be upgrading a NIC driver or a router firmware should also have the technical skill to A) Test the update, B) Read and understand the release notes, and C) roll back the update if it has unintended side affects

      Many password managers use Teh Cloud (tm). There's a damn good reason to be reluctant to store all of your passwords on somebody else's hard disk. Local password managers solve that problem, and now we're back to the classical problem of 'backing data up' and 'single point of failure'. Even at that, who do you trust? Heartbleed was a particular mess from a PR perspective because Open Source ("More secure than Microsoft!!11") had a spectacular failure that was used by "Experts" - people who were supposed to be putting security at the forefront. If such a widely circulated OSS project could have such a problematic bug, what possible hope does a regular user have with respect to betting on the right horse? Even if they do, there's nothing that they can do for the far end doing stupid things - all the password managers in the world won't change a blessed thing if the password was for Sony or Ashley Madison. It's all risky at some level, and ultimately, password managers overcome a shortcoming of computers themselves. Non-Experts have things to do. Writing passwords down in a nondescript password book, kept in a room separate from the computer itself, with each of the passwords changed annually, is probably the simplest and cheapest way a non-expert can put themselves comfortably in the third standard deviation.

      All software has bugs. Security is always a trade-off between convenience and usa

      • "Experts" are much better equipped to work around an update that makes a mess, and "Experts" are better able to pick up UI changes than "Non-Experts". Security is a good reason to update/upgrade, but every non-expert I know whose phone got the Lollipop update described it with obscenities, and would have been perfectly fine with a 'security patch only' update. The problem is that there's no consistent way for non-experts to know whether this will be a "transparent security fix" kind of update, or a "this will f'k up my s't and rearrange everything for no good reason" update. Even updates that don't make a mess of the UI cause other problems. Windows XP, circa 2001, needed 256MB of RAM to run acceptably. by the end of its run, the UI hadn't changed, but somehow, it required at least 1GB of RAM when it was (supposedly) the same OS. Admittedly an obscure example (but the only one I can think of at the moment), an Intel wireless NIC driver update I did once removed the ability to specify my own MAC address. A router firmware update I did once notably decreased the throughput of the network traffic it was processing. We all remember the Slashdot outcry when Sony removed OtherOS from the PS3. "Update" has a long history of having mixed impact on end users, so any "Expert" who both unilaterally applies updates and doesn't understand why "Non-Experts" don't share this practice may well have a thorough understanding of computers, but a piss poor understanding of humans.

        I didn't see any experts in the article suggesting blindly installing updates without testing (if possible, like in a corporate environment for instance) or reading the release notes. Anyone with the technical skill to be upgrading a NIC driver or a router firmware should also have the technical skill to A) Test the update, B) Read and understand the release notes, and C) roll back the update if it has unintended side affects

        I don't dispute that. The point I was making was that updates are not universally better than their predecessors. Yes, I rolled that firmware back, but the fact that I needed to do so was more where my objection was focused.

        Many password managers use Teh Cloud (tm). There's a damn good reason to be reluctant to store all of your passwords on somebody else's hard disk. Local password managers solve that problem, and now we're back to the classical problem of 'backing data up' and 'single point of failure'. Even at that, who do you trust? Heartbleed was a particular mess from a PR perspective because Open Source ("More secure than Microsoft!!11") had a spectacular failure that was used by "Experts" - people who were supposed to be putting security at the forefront. If such a widely circulated OSS project could have such a problematic bug, what possible hope does a regular user have with respect to betting on the right horse? Even if they do, there's nothing that they can do for the far end doing stupid things - all the password managers in the world won't change a blessed thing if the password was for Sony or Ashley Madison. It's all risky at some level, and ultimately, password managers overcome a shortcoming of computers themselves. Non-Experts have things to do. Writing passwords down in a nondescript password book, kept in a room separate from the computer itself, with each of the passwords changed annually, is probably the simplest and cheapest way a non-expert can put themselves comfortably in the third standard deviation.

        All software has bugs. Security is always a trade-off between convenience and usability.

        Agreed. Where each lies, however, is not always cut and dry. PM's make it more convenient to have 20-character, random generated strings in active rotation, but less convenient than simply using "Hunter2!" everywhere.

        A properly written "Cloud" password manager *CAN* do both by only storing the encrypted information in the cloud. It also encourages (and can generate) unique and random passwords for each site. That way when Sony or Ashley Madison get hacked, the perpetrator gets a unique random password that won't give them access to anything else. A properly-written cloud based (all encryption is handled locally, plaintext is *NEVER* in the "Cloud") password manager has the added benefit of working on mobile platforms where the physical book in the other room can't help you if you are on your laptop in the coffee shop or on your phone waiting in line at the grocery store.

        The problem with your "properly written" qualifier is that it presents

        • The problem with your "properly written" qualifier is that it presents an inherently problematic challenge. LastPass says that it operates the correct way, but how can I verify that? Because their website says so? I have no meaningful way to acquire proof that it does what it's supposed to do. Additionally, if I do may unique, gibberish-string passwords, I officially become dependent on LastPass; that dependency has its own points of concern. It may not convenient to have passwords written in a book that's left at home, but its tradeoff between "not being available in a grocery store" and "not being susceptible to LastPass hacking / ending service / software vulnerabilities / NSL" has definite advantages on both sides.

          First of all, while the physical book of unique passwords for every site is the best solution as far as security goes, the average user isn't going to be able to deal with not having access to xyz.com in the grocery store. It's much easier to be lazy and use the same password everywhere and store that in the browser's crappy, unencrypted password manager so they don't even have to put in the effort to remember it.

          You are right in that Lastpass does provide an auditing challenge. As you noted earlier, even

        • The point I was making was that updates are not universally better than their predecessors.

          Most of the software I rely on is years old. I almost agree with the "expert" advice, except I follow it in a different direction. Software that frequently has updates available is not to be trusted. I agree that in order to safely run software, you need to install updates, because security bugfixes almost never have a separate channel than other changes.

          However, another way to maintain updated systems is not to install updates, but to uninstall anything that updates frequently. You still have only updated

      • I didn't see any experts in the article suggesting blindly installing updates without testing (if possible, like in a corporate environment for instance) or reading the release notes.

        If they don't know that is the result their advice will achieve, they're not very expert.

        The biggest challenge to security is user actions, so if they don't understand how users use, they aren't very expert. Speaking or writing words will not cause users to read other, larger numbers of words. That is just not a technical result that is achieved by giving advice.

  • by Anonymous Coward

    A) Anyone using the term 'best practice' has already lost half their audience. Being the 'best' is a hard claim to make.
    B) Real world usability trumps ivory tower douchebaggery. Stop making people have eleventy digit passwords with special characters that they rotate weekly. You aren't helping.
    C) The world is mostly people who just want to get shit done - as an IT guy, your stuff is an appliance. People don't care about nuance.

    • A) "Best practices" are a set. The entire set, which is known to be incomplete, includes all the practices that are candidates for being best in different situations. That is why it is "best practices" and not "best practice." I do admire your dedication to rejecting absurd absolutes, but you missed the mark on this one. That pluralization changes the entire character of the statement.
      B) While in general this is a "pet peeve" of mine, you state it way too broadly. There are times and places for various diff

  • by Anonymous Coward

    "Security Experts" are mostly fraudsters working for the anti-virus industry. You don't get security from anti-virus software. You compromise it by running additional proprietary applications which can't be inspected. This is not to say the sources being available make it secure, but it is a critical found for which any failure to do so is the equivalent of building a house on sand. It might work, until the earthquake hits. The lack of security is the result of holes (bugs) and user-related design issues. I

  • by Anonymous Coward

    I've known too many self proclaimed security experts out there to buy what they're selling.

    Too often the self-proclaimed expert just reads a few blog articles that sound good, claiming "Best Practices", without actually knowing what they're talking about.

    Then there are the ones writing the blog articles who pull crap out of their ass, and call them "Best Practices", just because it sounds good.

    Lastly there are ones like Jason McNew, who doesn't seem to actually know anything about security. Mr. " I watched

    • I totally agree. The first thing I teach security trainees is that if it is your own security, you have to know and care about thousands of technical details. If you're being hired to deal with somebody else's security, then you have to follow the standard Best Practices because the goal is to provide a measured level of security precautions, not to promise end results. It isn't art, it isn't creative writing, it is a matter of providing the correct type of service.

      Just like, the job of a security alarm com

  • The credit card system works pretty well - so easy to use that family members usually don't have any trouble using each other's cards. Behind the scenes however, there are comprehensive fraud detection systems, as well as clear responsibilities of fraud liability (usually card issuer).

    I agree with another poster who mentioned that the onus of security should be mainly on the system - much more than the end user. What this means is that if you're going to setup any kind of password or multi-factor authentica

  • Updates are often expensive and disruptive to an organization. The security expert may not care because it's "somebody else's problem". (I suppose this works both ways.)

    Software often depends on multiple layers. Updating one layer often breaks another. Typical steps involve:

    1. Keep an eye out for updates
    2. Read up on any changes
    3. Create a test stack or station to test an update in your org's environment and/or with the other layers.
    4. Fix or devise work-arounds for any problems caused by the update found

  • >"Non-experts are less likely to use password managers: some find them difficult to use, some don't realize how helpful they can be, and others are simply reluctant to (as they see it) "write" passwords down."

    Yeah, because only non-experts would worry about a closed-source, unknown, third party having access to all their extremely sensitive passwords, stored on a server outside their control, stored with unknown methodology, connected to the Internet, with who-knows what access to the data.

    Yeah, only non

If all else fails, lower your standards.

Working...