Marketing wouldn't let me call this "Before Preaching, Stop Punching Yourself"

by

But I'm admin on HubSpot

Editor’s note: Marketing wanted to name this blog “Before You Make Any More Cybersecurity Awareness Content, Fix These Outdated Practices” but it seems we were outsmarted by our quick-witted Deputy CISO. While we do not condone his use of HubSpot admin rights, we do enjoy his security awareness approach.

Some seem to love Cyber Security Awareness Month. Of course, at least as many despise it, because it makes no sense to have intense focus for one month and then forget about it for the other 11. 

Without saying if I love it or if I hate it, I decided to write a set of rules. If any of this is a problem in your organization, you HAVE to fix it before you are allowed to fill up user’s inboxes with more “awareness”.

Have you recently told someone working in HR to not open attachments in email? Have you told someone to not click things on the thing-clicking machine?

Here are signs you shouldn’t hire some “creatives” to generate “content” to “educate users” this year:

Your company blocks copy/paste on a website login form

Are you making any person using a password manager to log in to your service hate computers, your company AND behave less securely by blocking paste for “security reasons” ? 

Are you driving people to install browser extensions just to deal with the completely irrational behavior your login form exhibits?

Why? Do you WANT people to reuse passwords from other sites, making sure their accounts on your service will get compromised, or do you simply want people to use simple passwords that are easier to crack? 

Did an auditor tell you to do this, and nobody dared argue?

Go fix this before you tell any of your employees or customers ANYTHING about cyber security awareness month.

Password expiration

Because you want your helpdesk to suffer, you make passwords expire. Sure, there is absolutely no security benefit to it because people only rotate the last digit in the password, but in 2006, a QSA told you to do this every 90 days.

NIST started recommending that practice to end years ago. This fall, they’ve made that guidance stronger.

If your employees or customers have to rotate passwords at a certain frequency, you are hereby prohibited from celebrating October Cyber Security Awareness Month.

No password manager for employees

Are you really going to send an animated video of poor quality to people, instructing them not to reuse passwords, while simultaneously not providing them with an easy to use password manager? 

Slow down, Password Punisher!

Weak or no MFA

Stop blaming people for leaking credentials when technical solutions exist. Imagine if cars came with a button that made the airbags pop, and car manufacturers repeatedly told you not to press it. Just REMOVE THE FACE PUNCHING BUTTON!

Your HR departments sends emails indistinguishable from phishing

Explaining to someone what is and is not phishing is very difficult. Most people do not know that email can be sent without authentication. Many of you reading this are already thinking of yelling at me in your heads “But but SPF! DKIM/DMARC! Hasn’t this guy heard of BIMI?”. Alright.

But in reality, spam will also come from domains that aren’t the right one. Sure, it’s not exactly the right domain, but it looks like it. Or it’s a completely unrelated domain, with a reply-to that seems to be legit.

How do you explain any of this to someone and then expect them not to be confused when the HR department sends out a survey asking for sensitive information, hosted on a free SurveyMonkey page that isn’t on a subdomain of your company? Or when your support team does the same to a customer, using some support SaaS tool that isn’t on your domain?

Laptops that can’t survive hotel Wi-Fi

VPN VPN VPN VPN VPN VPN VPN. Why do so many people sound like a sponsored Youtube video?

If you’re recommending that people use a VPN when using “public Wi-Fi” because you’re afraid of data being sniffed or modified in transit, spend some time hardening browsers and laptops, and ensure you do not provide any service over unencrypted protocols like POP3 or IMAP without TLS.

Once you’re done with that, when you get the urge to yell “VPN” again at a random person using a laptop at Starbucks, read this to relax instead.

Authenticating callers at the help desk with security questions

Security questions are just passwords, but worse. Not only are they not safe, they’re not user friendly. How would I remember what I said my favorite dessert is? And if I said “poutine”, then everyone knows anyway.

Worse, relying on “private” information like SSNs. Social security numbers for pretty much everyone have been leaked at least once, so why are we using this to authenticate anyone?

Instead of having everyone in your company waste an hour looking at videos about not putting passwords on post-it notes, rework your password reset process to use multifactor authentication.

Next? Time to celebrate!

If you did get rid of one of these outdated practices, you’re now allowed to celebrate by sharing with your employees and/or customers why you did it, and how they’re now safer AND more productive.

You’ve used October Cyber Security Awareness month as an excuse to improve cyber security. 

Well done!

Guillaume Ross
Guillaume Ross

Guillaume has been a security practitioner for well over a decade, building on prior experience working in enterprise IT. He also produces technical training content as a hobby, as a way of staying sharp with recent tools and techniques. With experience in multiple cybersecurity companies, he's also worked on the blue-team side for large organizations and startups, and really enjoys challenging preconceived ideas. Why do something because everyone else is, or because we've always done it this way? Let's prove it's useful first!

Keep Reading

Now Available: JupiterOne’s Public Postman Workspace | JupiterOne
October 31, 2024
Blog
Now Available: JupiterOne’s Public Postman Workspace

Explore JupiterOne’s Public Postman Workspace to streamline your workflows and enhance your security operations.

Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets | JupiterOne
October 16, 2024
Blog
Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets

Vulnerability scanners flood teams with alerts, but CTEM helps prioritize based on exploitability and business impact, ensuring focus on the most critical threats.

How CTEM Prioritizes Critical Threats and Safeguards Your Most Valuable Assets | JupiterOne
October 9, 2024
Blog
How CTEM Prioritizes Critical Threats and Safeguards Your Most Valuable Assets

Learn how CTEM helps organizations reduce their attack surface, protect valuable assets, and stay ahead of attackers. Download our white paper to get started with CTE

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.