83 Percent Of Security Staff Waste Time Fixing Other IT Problems (betanews.com) 204
An anonymous reader shares a report: A new survey of security professionals reveals that 83 percent say colleagues in other departments turn to them to fix personal computer problems. The study by security management company FireMon shows a further 80 percent say this is taking up more than an hour of their working week, which in a year could equate to more than $88,000. For organizations, eight percent of professionals surveyed helping colleagues out five hours a week or more could be costing over $400,000. Organizations are potentially paying qualified security professionals salaries upwards of $100,000 a year and seeing up to 12.5 percent of that investment being spent on non-security related activities.
On what planet is this true: (Score:5, Insightful)
"IT personnel are usually the helpful, go-to people for sorting out issues"?
If people are calling system security to help with computer issues that should be handled by the IT help desk then it's probably because:
1. The issues being reported appear to be security problems.
2. The IT helpdesk consists of condescending asshats which most employees avoid at all costs (based on my work experience, I bet this is the big reason).
More seriously, if security staff are only being called in on inappropriate calls that take up less time in a given week than they spend choosing what to put in their coffee; you've got a pretty efficient IT setup with very little to worry about.
Or you haven't gotten a clue as to what's going on and the North Koreans are actually running your business.
Remember that the biggest security problem is ... (Score:2)
. . . the loose nut behind the keyboard.
"I didn't change anything on my configuration, but my computer is not working any more, so it must be some automatic security restriction that happened automatically . . . "
Re: (Score:2)
Obligatory [dilbert.com]
Re: (Score:2)
To be fair business end users treat IT staff like shit blaming them for everything wrong with the crap coding produced by software companies. To be fair staff get rightly pissed off when their work is destroyed by the computer system approved by IT staff. To be fair the IT staff have no real choice in the software deployed and according to all the warranties, all software currently out on the market is shit and is not worth buying (read the warranty). Problem, neither the business users nor the IT staff, ge
Re: (Score:2)
Re: (Score:2)
Those that works in IT Security generally have years, if not a decade or more, of tier 2 and teir 3 level experience. Meaning, they've long graduated helpdesk, and yet as the most experienced in the group, they're still the go-to people to seek regardless of the fact it's NOT THEIR JOB.
I work in government IT on a nation-wide project for security remediation. Everyone has at least 20 years of IT experience. We are completely separate from the national help desk and the local desktop teams. The local sites kept trying to draft us for special projects because we took up valuable office space and gave nothing in return that improves the site's reporting metric. Our value weren't realized until the sites started passing routine security inspections with little effort on their part.
Re: (Score:2)
Nothing you did increased their security & compliance metrics?
When the project got started three years ago, there was a half-dozen reporting systems that all said different things about the same data. Today there is only one reporting system.
For such a wildly successful project, I'm surprised that nobody had metrics showing (and justifying) the project's personnel.
Security compliance three years ago was 70% or less. Today it's 95% or better.
Re: (Score:2)
You make a LOT of grammar mistakes and in many cases you skip entire words.
Somebody has to keep the grammar Nazis busy. Otherwise, the self-righteous pricks would leave for Reddit.
If I did, I wouldn't be capitalizing my sentences.
It might also explain why the creimer you talk about and the creimer we read about are two completely different people.
I get that reaction a low when I go in for job interviews. When the hiring manager looks at my resume, looks at me, and looks at my resume again, I know that I'm not getting the job. Former poster children of mongolism aren't supposed to be technically brilliant.
Re: (Score:2)
Well that's just it; nothing I've read from you is remotely brilliant, technical or otherwise.
This is Slashdot. You must be new around here.
Re: (Score:2)
I'm still chuckling about how you think "girls" talk about you...
Women who prefer messy sex calls me Heavy Creamer. I'm a big guy. I can deliver in volume. Continue on with your sexual fantasies about me. Makes great entertainment for everyone else.
Re: (Score:2)
Local IT support employed by the same company usually fixes stuff easily, outsourced IT support is another factor - an urgent fix takes 48 hours and that don't help you when you have a problem with the projector in a conference room with a high profile customer that has to be fixed in 5 minutes.
To protect and serve! (Score:2)
Huh? (Score:2)
"Not only are modern IT security professionals faced with a growing complexity and skills gap and keeping up with technology investments and advancements, but they are also expected by colleagues to help them sort out their personal computing woes," says Michael Callahan, CMO of FireMon. "IT personnel are usually the helpful, go-to people for sorting out issues, but it's only when you start to cost it out that you realize how much money it equates to."
Do they mean work colleagues come to them with problems instead of the "normal" IT staff? Or that other, non-security, IT staff are coming to them with problem they can't figure out on their own?
In the first case why don't the security people direct the questions to the correct staff members? In the second case, either the company isn't spending enough on hiring and training and the "savings" there is coming back to bite them in the ass, or this is perfectly normal collaboration between colleagues. If ((
Coffee breaks? (Score:5, Insightful)
Re: (Score:2)
Yup, which is why a lot of places based work day estimates on 6 hour days, even though staff work for 8 hours.
There's toilet breaks, there's staff meetings, there's coffee breaks, there's chatting to co-workers, there's posting on slashdot.
Re: (Score:2)
Yup, which is why a lot of places based work day estimates on 6 hour days, even though staff work for 8 hours.
There's toilet breaks, there's staff meetings, there's coffee breaks, there's chatting to co-workers, there's posting on slashdot.
Staff meetings are not work? Wait... nevermind.
Re: (Score:2)
>Staff meetings are not work?
Good ones are... but I've been in IT for a couple of decades and been involved in a lot of meetings over that time at several different companies... and I can think of ONE meeting that was highly productive and I would consider 'good', and a handful of others that were moderately 'OK'.
The rest were a waste of time where managers were playing around at 'communicating' and failing miserably. Usually, a well-written email would have done the job in a fraction of the time, and
Re: (Score:2)
Excuse yourself, something bad you ate. Don't come back. If they ask, tell them the paint was peeling in the bathroom/your office. They will thank you and you can get actual work done.
If they bug you about it, next time, the night before, hard boiled eggs, KimChi and cheap beer...
Re: (Score:2)
The rest were a waste of time where managers were playing around at 'communicating' and failing miserably.
I don't understand why this is so common, shouldn't managers be folks that were once NOT managers? I mean, I worked my way up from the bottom (though I have *NEVER* been any sort of "help desk"), and consider myself a pretty good manager that does not waste the valuable time of my worker bees. They don't need me to pontificate about "synergy" or some other bullshit. I call meetings when it's necessary for people to be on the same page, talk about project status and problems, maybe occasionally brainstorm if
Re: (Score:2)
Some companies have more meetings where issues are raised why they don't reach their goals than actual time over to do the work.
Re: (Score:2)
Without coffee, you wouldn't get anything done in our company. I have not had a single meeting where you didn't get your results during the coffee breaks rather than the actual meeting. Mostly because there is no protocol running during the breaks. You can simply ask what the fuck is their problem why they keep blocking your proposal, and you actually get a sensible answer to it, and then you can actually start to work on the problem.
I'm currently trying to figure out a way how I can simply forgo meetings a
Re: (Score:2)
Splitting up your day with tasks such as keeping you awake, or motor tasks such as walking to the bathroom to relieve something that distracts you is positive.
Distracting your work with other work isn't positive. It is just distracting and best and leads to burnout at worst.
Security Professionals? (Score:2)
Do you mean guys with guns on their hips? Or at least ones who place their hand thusly, giving the appearance they are armed?
Re: (Score:2)
Re: (Score:2)
They should probably hire some friends to work with him, so that somebody doesn't shoot him while his hands are busy doing computer stuff.
This isn't The X-Files where two agents are all alone against the creature of the week. When a search warrant is executed, it's a team effort to secure the evidence as quickly as possible.
Maybe I'm not familiar enough with their procedures but it seems ridiculous to me that a forensic expert would be doing any of his work in a location that has not been secured.
Until the location is secured, the expert is just another agent.
It's not all wasted money (Score:2)
How much extra time would a less qualified (lower paid) person be taking to do the same work?
If they get paid 20% less but take twice as long, there is savings, not waste.
Re: (Score:2)
0.8 * 2 = 1.6
That time is not wasted (Score:5, Interesting)
It serves to establish and maintain closer relationships between users and IT security people, so that, you know, if a user has a suspicion of a security problem, they feel more confident and approach IT security staff earlier. But that idea flays wayyyyy above the heads of MBA morons.
Wow. (Score:2)
I wouldn't mind earning $88K for working one hour a week.
It's a chain of 'pass the buck' (Score:5, Insightful)
1) The help desk won't tell the user they don't know how to do their job (and usually the user is so bad at describing the issue they probably haven't had a chance to figure out it's a PEBKAC issue) so they dispatch desktop support.
2) Desktop support doesn't understand what's happening and doesn't communicate well with the user to get the details required to figure it out, so they blame network (security/policy/site connectivity/whatever).
3) The network tech stops what they're doing to prove it's a desktop issue so they can push the job back down the chain.
4) The desktop guys figure out the user is improperly trained - sometimes they're just clueless, sometimes there's a change and their department didn't do the training... or even a simple notification.
That describes 80% of the tickets I am aware of in our organization. Sometimes it bounces back and forth between steps 2 and 3 a couple of times, to the user's frustration and the discredit of the IT department. The important thing is that I am neither tier 1 support nor a network guy, so I can mostly sit to the side and look down disdainfully at the whole farce without actually having to do something about it.
Comment removed (Score:4, Informative)
Re: (Score:2)
Yep. This is perhaps the best advice you can give anyone who does wide-ranging support over diverse systems. If you're a phone jockey for a specific piece of software or something, they might be a bit less relevant, but if you're desktop/server/networking/everything support then the advice above will save you a ton of time and grief.
I would add that the 4th and final part would be the soft-skills to get the user to help you scope the issue without them getting angry ("Why are you doubting me?!") or frustrat
Re: (Score:2)
Where tickets go to die (Score:2)
First off on the topic, I don't think it is all that surprising, but would add that it isn't just "Security staff", but essentially all IT staff not in a direct support roll. It happens to me all the time, and for the most part I'm happy to oblige if I can. It only becomes annoying when I have other priorities or pressures, and so-and-so wanders by and wants me to figure out his printer problem or something when I should be testing a corporate application for bugs on a deadline.
Second I do have a limited su
Shovel ready jobs... (Score:2)
Re: (Score:3)
>I tell people to call the help desk phone line
I tell them to email our automated ticketing system. It creates a ticket with the correct user information and doesn't require our help desk staff to waste any time interpreting what the user's trying to say... the user just types out what they will and can attach a screen shot.
Then the system does a keyword search and 99% of the time it will appropriately assign the ticket to the correct class of support personnel.
Then the help desk folks can ALSO spend mo
Really? (Score:5, Insightful)
I don’t understand the math, here. The sourced “article” (it’s more of an advertorial, really) affirms:
- salaries upwards of $100,000 a year
- 80% say more than 1 hour per week, which could equate $88,000 per year.
- 8% say more than 5 hours per week, which could equate $400,000 per year.
- up to to 12.5% of investment squandered.
At the risk of making a fool out of myself:
- $100,000 per year is about $50 per hour, isn’t it?
- 80% staff spending 1 hour per week (50 hours per year) would then cost an average of $2000 per employee per year, not $88,000.
- 8% staff spending 5 hours per week (250 hours per year) would then cost an average of $1000 per employee per year, not $400,000.
- 8% staff spending 5 hours per week (12.5% of the work week) and the remaining 72% spending 1 hour per week (2.5% of the work week) would represent an average of 2.8% of investment squandered, not 12.5%.
Naturally, to measure the true loss, you’d also have to deduct the costs saved from not asking the regular IT staff to do the job, and also the gains obtained from the immediate increase in productivity resulting from the security staff’s intervention.
Of course, the article is thinly disguised advertisement for some “automation solutions available that help them keep their day-to-day work”, so accuracy may not be paramount, compared to shock value
Re: (Score:2)
Really, what were you expecting? (Score:2)
It's from beetrootnews. By vegetables, for vegetables, about vegetables.
Wise use of money (Score:2)
Too often the people that fix things open up security holes. Most of the time IT departments 'training' consists of "This is how you google the solution to your problem." and "Call this Vendor for this problem."
For anything more than that, the help desk is useless but the Security department knows how to fix the issue.
Really? (Score:3)
It's generalist vs specialist (Score:5, Insightful)
Security people need to be on top of multiple fields. You can't be in IT security without knowing a lot about all the layers in system.
Specialist network techs look at a problem and push it to specialist server/desktop techs if it doesn't fit their view of a "network issue". The user gets bounced back and forth till they give up or figure it out themselves.
Take the problem direct to a security specialist and 9 times out of 10, they will be able to point directly to the root of the problem because they don't have tunnel vision. Word of mouth spreads the idea that "Fred in security will know how to fix that", rinse and repeat and you spend half your day on support issues.
It's human nature. And not necessarily a bad thing as as single call for help can lead to nipping a security issue in the bud..
More general training (and higher pay!) for help desk staff is the only real answer but people are locked into the idea that help desk are "ticket generators" rather than troubleshooters.
Re: (Score:2)
Karma: Fair turn (Score:2)
That's okay, I spend 40% of my time working around app response and usage problems created by overly-aggressive McAfee settings put there by Security.
What's the difference? (Score:2)
You're basically paying a 'security' professional who is really just an "IT person" in order to make sure you got the 'security' in your company and can check of a box on the PCI/HIPAA/SoX compliance worksheets.
What else is the security guy supposed to do? You can't read/write CVE's all day long, you actually have to do system or network administration at some point.
And what would happen if the guy was only relegated to the core job description? He'd be playing video games all day long anyway.
Re: (Score:2)
The danger of plenty of IT jobs - if you're competent and have time to do more than just 'put out fires' (i.e., apply quick and sloppy fixes instead of taking the time to fix the fundamental issues) - eventually you can eliminate most of your own job just by setting things up correctly.
If you're lucky that means they recognize you're good at improving system efficiencies and move you on to something else. If you're not lucky, it means they're happy sitting in 'maintenance' mode, they shrink the team, and s
The problem is you can't simply delegate it (Score:2)
Security, by the very definition of the job, deals with stuff that isn't for public consumption. That in turn means that it usually takes a bit of work to get these people cleared to do what they're doing. It actually took nearly 2 months for me to just get all the necessary clearance checks done so I can sit in the office that I sit in now. Without them, no chance to get in there at all.
Yes, that means I have to empty my own waste bin and run the vacuum cleaner myself every time it gets so dirty that even
I'm actually going to try to defend some of this.. (Score:5, Informative)
My experience doing I.T. for several mid-sized companies over the last 20 years is, none of them had big enough budgets to justify hiring dedicated "security" people. It's simply the best "bang for the buck" to hire a core group of a few I.T. "support people" who take care of servers, trouble tickets from users, and do some of the planning and upgrade projects.
When I've met "InfoSec" guys working for businesses similar to the ones I've worked for (perhaps a bit larger in size with larger budgets)? They typically come off as a bit arrogant. They like to spend a lot of time going around to other people in I.T., giving out their unsolicited advice on how something or other should be done, and do a lot of bending the ear of middle or upper management to get policies and procedures put in place to formalize their ideas.
Are they intelligent people who actually do have a lot of knowledge about securing a network? Yes! But they often fail to really grasp that security is always going to be a trade-off. The more you secure the environment, the less worker-friendly it becomes. The I.T. "generalists" who have been supporting networks, servers, workstations, and all the peripherals and software swirling around them often have an awareness that many of these recommendations for "better security" aren't being implemented. The InfoSec types become a bit like annoying flies or gnats that keep buzzing around your head while you're trying to work. They work against your own goal of improving efficiency and worker productivity with their demands that "everyone change their passwords every 14 days, using no less than X number of characters with upper and lowercase, plus at least 1 special symbol", or that all the USB ports on the desktops be glued shut, or ??
I'm sure that in many cases, these guys get paid handsomely to secure things, but once they've implemented all the ideas they can come up with -- they have a lot of time on their hands, just checking log files or doing the occasional audits of what's already supposed to be in place. It makes sense to utilize them to do more of the "day to day support" stuff, so you're not paying them to sit on their hands waiting for the next big malware outbreak or suspected hack to come along.
Re: (Score:2)
I think you're spot on.
I think one reason the security people are getting dragged into ordinary problem solving is that ordinary support people are running into end-user problems that are *caused* by security configurations that support can't change.
I think a lot of security people want to sit in the back room and implement a bunch of security changes without consideration of what breaks or how it effects end users. It may be the "right" thing to do, but they don't care about the side effects.
Let's ask the guy in the cubicle over there (Score:2)
Re: (Score:2)
Re: (Score:2)
And here is the reason. (Score:2)
The reason they are doing outside work is because under normal circumstances most of them are doing nothing. Most are so tech ignorant that they just watch their tools for alerts but don't have the skills needed to set them up for much more than what ships with th
Geez, I'm a developer making well over six figures (Score:3)
In fact, clients often specifically tell me to not to mention the problems I run into that prevent me from doing my job.
I just can't believe these people are going to get their panties in a bunch over security professionals losing an hour a week here and there.
Um.... OK (Score:2)
Re: (Score:3)
Re: (Score:2, Interesting)
Rice's theorem hates your guts.
Re: (Score:2)
Rice's theorem hates your guts.
Rice's Theorem [wikipedia.org] is a corollary of the Halting Problem [wikipedia.org]. Both are commonly misunderstood. It is true that there is no procedure for determining if an arbitrary program halts (or does almost anything), but that isn't true for all programs. If a program is designed to be proven correct, and carefully written, then its behavior can be determined.
In practice these constraints are so onerous that almost no one outside of the tallest ivory towers thinks that "proofs of correctness" are a realistic path to more r
Re: (Score:2)
Re:It wouldn't be a problem if... (Score:5, Insightful)
Actually, they are not "sloppy" and "lazy". They are the cheapest "coders" the MBA-morons in charge could find. They could do a better job if their life depended on it. Alternatively, coders that do have it and can do it (a minority) are not given enough time to clean up and fix remaining issues, because said MBA-morons think "it works". I have learned to not give them anything that has the complete functionality before all other aspects are fine. Otherwise they declare the prototype "ready for production" and that is not good at all.
Re: (Score:2)
Well I am good programmer AND have an MBA, so I'm trying to figure out if I should be offended.
Re:It wouldn't be a problem if... (Score:4, Insightful)
Sure, blame the programmers.
You want a secure system? I can do that. I'll hit the big red fucking button on the data centre wall and all our data will be beautifully secure.
Strange, people I work with don't want that to happen. They would prefer to compromise security in order to achieve other outcomes.
That's got fuck all to do with programming. That's people, processes, stupidity, resource constraints and other factors that are so far beyond the control of programmers that blaming them is total idiocy.
Shit, you already know you shouldn't trust the software to be secure so what fucking difference does it make whether the programmer is any good anyway? Put the right mitigations in place and you'll survive a four year old jumping on the keyboard his parent left attached to your GIT repository.
Fucking security "professionals" need to learn how to do their fucking job, and that it doesn't include blaming every other cunt for their own failings.
Re: (Score:2)
Rejoice. At least if you're in Europe. We recently got changes in our laws that those MBA dimwits are now personally (read: with their own stash of money) responsible for security breaches if they can't show that they've taken reasonable steps to get their act cleaned up.
In other words, you won't find an ITSEC in Europe right now that isn't stressed out, overworked and has more overtime piled up than a doctor in a warzone.
Re: (Score:2)
Can you give some references? This is seriously difficult to believe given how much our governments normally kiss the MBA arses.
Re: (Score:2)
I'd have to look it up but IIRC it either has become or is about to become a EU guideline (which is essentially EU "law") that CEOs can be made personally liable for security breaches and the ensuing financial backlash if they can't show that they have taken reasonable steps to mitigate the risk.
Yes, most likely this means that having a CISO and not just using him as a liability shield (read: find the cheapest idiot willing to sit on that ejector seat) will most likely already do, but nobody wants to be the
Re: (Score:2)
They could do a better job if their life depended on it.
Not entirely sure what you're trying to say. Did you make a mistake in that sentence? Was that supposed to say "couldn't"? Did you do that while complaining that people make mistakes? The irony is so thick you could cut it with a knife.
Re:It wouldn't be a problem if... (Score:5, Insightful)
You appear to have no fucking clue whatsoever about the software creation process, its constraints and complications, and how fucking astonishing it is that things as complex as modern operating systems even fucking run, let alone work.
You want to mathematically prove 300GB of Windows source code? You go right ahead, then borrow a time machine so you can come back and tell us how it went, because by the time you've finished our grandchildren will all have died of old age.
Re:It wouldn't be a problem if... (Score:4, Insightful)
How about starting with not appointing idiots with zero knowledge about code as their bosses, and not letting those zero-brain idiots set the milestones and delivery dates?
It is a little known fact that programmers don't really like to ship buggy, unstable and barely tested code. Most of them would just love to ship rock solid code that could even drink fruity drinks with little umbrellas because it's SO secure. But that takes time they don't get from their PHB morons.
Re: (Score:3)
Even if programmers always followed best practices, this would not eliminate vulnerabilities.
It's easiest to understand this through analogy. Your house has security vulnerabilities. A thief can kick in a door, or break a window, or just ring your doorbell pretending to be a neighbor. No matter how solid the construction, there's always a way in, given enough will and determination.
Code is no different. It's really just an arms race. You can fortify your code, but then so will the intruders.
Re: (Score:2)
Re: (Score:2)
It is possible to prove the correctness of programs
Only if the thing doing the proving knows what your actual intention was. Your program can be logically sound, free of intrinsic vulnerabilities and still do the opposite of what you intended.
Re: (Score:2)
Re: (Score:3)
Re:Who knew!!! (Score:4, Insightful)
(as long as it is legal).
Re: (Score:3)
I want to know my employer is getting value for the money they pay me.
If I'm spending my time doing things we can employ someone on a third of my salary to do, I'm going to suggest we do exactly that. I have no shortage of high value activities to put my time into.
Re: (Score:3)
If this is actually true...I never never met a person as altruistic as yourself.
It's a free country, live like you wanna live, but to me, I view work in a much more mercenary fashion. I want to get paid as much as possible, period...if they have me peeling potatoes for $100K+ a year, I'm happy to do it, and hope then never find anyone willing to do it cheaper.
The *only* reaso
Re: Who knew!!! (Score:2, Insightful)
That's a shame, but you do realise plenty of people take pride in their skills and get satisfaction from being useful and good at something?
Re: (Score:2)
Maybe I'm odd but I have skills that are genuinely worth the salary I'm paid.
My employer needs people with those skills, so why wouldn't I assure that they benefit from mine?
If they didn't need those skills then yeah, I'd tell them to replace me with someone cheaper that can do the things they need. I'll get a job somewhere else that actually needs me.
That's more rewarding for me personally as well as being basic business sense.
The potential conflict would come if they could replace my skillset for less, e.
Re: (Score:2)
(as long as it is legal)
Pray that you never find child pornography on a system. A coworker did and reported it to the IT manager, whom informed HR and Security (rent-a-cops). The coworker and IT manager gave statements to Security, and were questioned on video tape by the staff attorney. The IT manager and the security guard chief retrieved the system after hours. That was Tuesday. For the next three days, the user of that system freaked out, banged on doors, chased after the techs, and went pissing-and-moaning throughout the ha
Re: Who knew!!! (Score:2, Funny)
So that's why you were unemployed for two years!
Re: (Score:2)
So that's why you were unemployed for two years!
Uh, no. Try again.
Re: (Score:3)
Right - pray for it. It's not because it's a disgusting, abhorrent thing that brutalizes and damages innocent children - it's just a SUPER inconvenient thing to have to deal with making a couple legal statements and filing a report.
If it was a "SUPER inconvenient thing", the easiest course of action would be to do nothing.
You might even have to miss your lunch for a day or two.
My coworker reported the filenames he came across while transferring data between systems. He never looked at the images. He only had the log file from the data transfer. It was the IT manager and security chief's job to make the determination and confiscate the system.
Do you ever think before you post?
Yes, I do. Your knee-jerk hostility towards me is misplaced.
Re: (Score:2)
What's the big deal?
You missed the part where the user ran up and down the hallways like a lunatic for three days. The IT department was under lockdown protocol while the soap opera played out in the hallways.
Re: (Score:2)
And "lockdown protocol" is what, exactly?
Active shooter in the building, wait for instructions from security or police.
And why would the IT manager not simply call security and have the offending employee removed - either to police custody, or to a treatment program for his apparent nervous breakdown?
Security was recording everything on the hallway cameras.
I guess this sort of Mickey Mouse idiocy is what I'd expect from a company that would hire you.
This happened at hospital. The contracting agency I worked for had nothing to do with hospital security.
Re: (Score:3)
All child pornography reports are fake. Someone just wanted an excuse for a witch hunt.
The user was never told why security confiscated his system. He was offered a replacement system but kept insisting on getting back his old system. He behaved like a lunatic for three days, throwing away whatever professional reputation he had. An innocent person would have accepted a replacement system and continued on working.
Re: (Score:2)
If someone took my work PC with all of my data on it, I would lose my shit as well. He may have had a bitcoin wallet on there with a million dollars in it for all you know. Maybe his only copy of a manuscript he's been working on for half a decade is on there. There are other reasons why someone would lose their cool when their PC/Data suddenly is yanked away that are totally unrelated to kiddie porn.
There should be backups. If the IT department is doing its job, the loss of a particular machine should be inconsequential. If a person is storing critical data like a bitcoin wallet or manuscript on a single disk without a backup, they're gonna have a bad time no matter what their scheming coworkers are up to.
Re: (Score:2)
If someone took my work PC with all of my data on it, I would lose my shit as well.
In the Enterprise environment, "your" work PC can be replaced, reimaged and assigned to someone else for any reason at any time.
He may have had a bitcoin wallet on there with a million dollars in it for all you know. Maybe his only copy of a manuscript he's been working on for half a decade is on there.
User profile data is stored on the network and accessible by logging into any system on the network. If data got stored outside of the user profile (typically the root of the C drive), it could be recovered during the 90-day period that the hard drive is kept before being destroyed. For systems suspected of having kiddie porn, the law requires keeping the system intact for one year
Re: (Score:2)
video tape? When did this happen? 1987?
2012. It may have been a DV tape.
Re: (Score:2)
I have this problem.
A VP of a department with a staff of hundred low paid employees tells IT with a staff of 10 who is paid 4x as much to do data entry because they don't have the manpower to do it. Sure it is my job and I'll do it. However the company is wasting money on me where I could be doing something much more valuable to the organization. And that expense will get pushed to the customer.
For the consumer, do you want to pay an extra dollar for a widget, because the they had the IT guy working on
Re: (Score:2)
Re: (Score:2)
Wow. A whole hour a week. So if 1/50 (let's assume they work hard, more than a 40 hour week) of their salary is $88,000, then these security staff make about $4.4 million/year. Anyone hiring?
Re: (Score:2)
the article failed to mention that they actually only work 1hr a week.
Re: (Score:2)
Security is a specialized and complex enough field that you are either a security specialist or a dilettante. You don't do security "on the side". Just because you learned some nmap parameters by rote and know how to start Nessus (or more likely OpenVAS...) and actually scan a machine you're interested in doesn't make you "security staff".
Re: (Score:2)
You have security as main task, but to do it right you need to have a full understanding of IT services otherwise it's just going to be a kludge security with no meaning and use for the company. If that means that you need to fix a printer driver in order to also get the security right then so be it. Otherwise you waste two hours filing a ticket for a printer driver update and another day to get the low level IT technician to come out and fix it - or do a hack fix with remote control from India that still d
Re: (Score:2)
I do of course need to know how our services work, but I certainly don't need the same level of detail that the specialist for the area does. For example, I can do a webserver audit even if I don't know every tweak Apache offers to make delivery of those pages smoother. I can review webapp security without knowing the intimate details of how to make color gradients look pretty in css.
I know the parts that are relevant to security. I have to admit that I probably could not create a webpage that anyone wants
Re: (Score:2)
Small to medium businesses usually outsource their security. CISO-as-a-service is a reality.
Re: (Score:3)
IT security is a huge problem because it has been ignored until the recent past. Only now that security breaches start to get expensive, especially in the light of ransomware attacks that now also start to hit big businesses (because until now, a security breach there only meant that your data gets stolen and your identity gets abused, who gives a fuck about that?), and also changes in laws that put the knife for security breaches right at the throats of C-Levels, they start to replace mental lull with oper
Re: Government regulation needed (Score:2)
Re: (Score:2)
He drained one swamp to get his swamp even larger.
Now it's a gamble over how long he will be in office.
Re: (Score:2)