HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

The Cyberhacker Sitting Next to You

NO RATINGS
Page 1 / 2 Next >
View Comments: Newest First|Oldest First|Threaded View
Page 1/3  >  >>
Ann R. Thryft
User Rank
Blogger
Re: Good story on a real problem
Ann R. Thryft   3/11/2014 11:58:33 AM
NO RATINGS
Exactly--and that was my point. It's cultural.

William K.
User Rank
Platinum
Re: Good story on a real problem
William K.   3/10/2014 10:34:53 PM
NO RATINGS
Ann, the more disconcerting part of how accurate that stip appears is that it appears to be that accurate, meaning that so many of the upper management types fit the model of "the pointy-haired boss". Those folks who claim the sim8ularity can't possibly all be very far off, can they?

Ann R. Thryft
User Rank
Blogger
Re: Good story on a real problem
Ann R. Thryft   3/10/2014 12:27:24 PM
NO RATINGS
William, I think the vast number of people who think Adams bases his strip on their particular place of work is more than awesome: it's downright scary.

Elizabeth M
User Rank
Blogger
Re: Good story on a real problem
Elizabeth M   3/10/2014 5:18:22 AM
NO RATINGS
Yes, Rob, I would imagine background checks would help but it's kind of difficult and time consuming to do extensive background checks on every single person hired at a company, although I am sure companies with high security concerns do it. But even then you might miss something, or someone might just become disgruntled and try to sabatoge company or plant information. If I recall I wrote an article on this for another publication years ago, and the point of the article was that because you can't always control people so well you have to really secure your data and systems as best you can, and keep in mind that sometimes threats may come from inside so whatever you can do to secure systems from that, do so, by only giving people access to the systems or info they absolutely need for their jobs. But if someone with high security clearance wants to hack the system, you're right, I can't imagine how they can stop that.

William K.
User Rank
Platinum
Re: Good story on a real problem
William K.   3/7/2014 9:24:01 PM
NO RATINGS
Ann, yes it certainly does. And on more than a few occasions I have been ready to accuse Scott Adams of having cameras and bugs in my workplace. The similarity is awsome.

Ann R. Thryft
User Rank
Blogger
Re: Good story on a real problem
Ann R. Thryft   3/7/2014 3:52:53 PM
NO RATINGS
William, that sounds like a Dilbert pointy-haired boss story, doesn't it?

Mydesign
User Rank
Platinum
Re: Security Concerns
Mydesign   3/7/2014 4:56:49 AM
NO RATINGS
1 saves
"Good point, Mydesign. This will be very interesting as it plays out. There's simply no clear answer. "

You are right Rob, it's like a police and thief game. Security professionals are chasing hackers.

William K.
User Rank
Platinum
Re: Good story on a real problem
William K.   3/6/2014 9:12:56 PM
NO RATINGS
I had a manager refuse to even consider a proposal for an addition to their fire-suppression system because the cost of the system would come from the profits and make him look bad. This was a week afrer that same system had poured water all over the new parts of the buildings computer network system, which the repairs and replacements cost a whole lot of money. The addition to prevent the damage from ever happening again would have cost much less than 1% of the cost of the damage repairs. But the money was "not an investment in profitability", and so he was not interested. That was a branch of Delphi. He was the manager who cussed at people. (a lot of folks will recognise him from that description).

Rob Spiegel
User Rank
Blogger
Re: Good story on a real problem
Rob Spiegel   3/6/2014 3:29:58 PM
NO RATINGS
Thanks William K. Your answer to the question of why someone whoiuld want to crack into a plant network is the right answer.

Ann R. Thryft
User Rank
Blogger
Re: Good story on a real problem
Ann R. Thryft   3/6/2014 2:20:58 PM
NO RATINGS
That disbelief sounds like it's about the same from 2005 when I was talking to some experts on the subject for that WP (including high-level mil and ex-FBI guys). I find that kind of ostrich behavior hard to believe, yet it appears to still be widespread. The security pros told me it was due primarily to an unwillingness on the part of management to deal with the whole can of worms and the expenses involved. Of course, the pros would tell them just what they needed to do and point out that the costs would be much higher after a breach than to set up controls to prevent the breach in the first place.

Page 1/3  >  >>
Partner Zone
More Blogs
Enterprising Tesla Model S owner Steve Sasman seems to have figured out a way of recouping some of the cost on his car by renting the trunk out on AirBnB, the room/house rental website.
Everyone has had the experience of trying to scrape the last of the peanut butter or mayonnaise from the bottom of a glass jar without getting your hand sticky. Inventor Ron Jidmar thinks he has a solution to all of that nonsense with a flexible jar design that can be squeezed with one hand to lift contents from the bottom to the top of a jar or container, leaving the other hand free to scoop the contents out cleanly.
2014 was big dark year for cyber attacks. Here's the month-by-month blow-by-blow breakdown.
Microsoft unveiled more than a new operating system at its Windows 10 event. With its new HoloLens headset the company wants to make holograms a part of everyday life.
China’s manufacturing sector continues to contract this month but at a less severe pace, as the nation’s central government in Beijing fights to reverse a 24-year low in economic growth.
Design News Webinar Series
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
12/10/2014 8:00 a.m. California / 11:00 a.m. New York
11/19/2014 11:00 a.m. California / 2:00 p.m. New York
2/25/2015 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Jan 26 - 30, IPv6 for Micros – Hands-On
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  67


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Last Archived Class
Sponsored by Stratasys
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2015 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service