CYBER THREAT ARTICLE - RANTINGS OF A CYBER SECURITY ANALYST (JULY EDITION)

Rantings of a Cyber Security Analyst - (July Edition)

"Oh, you work in IT? Can you help me with a problem on my computer?"
I am sure anyone who works in the IT field has heard this during family gatherings. In a way, I understand there is always a misconception that people who work in the IT field are assumed to know everything about IT.

Computers, servers and all applications have always been marketed as easy to use products that can solve issues. I would draw this comparison with cars. Cars are always marketed as easy to drive, nice features and good mileage per tank or charge. No one would ever market a car with all the technical details like the camber angle, toe and so on, which made the handling of the car great (I am sure I lost some of you guys here). But that is the point, and for this example, a car mechanic would understand all these and yet, the mechanic would likely find a specialist who does alignment if there is an issue with the car pulling to one side when driving straight.

This also translates to the business world where some smaller companies hire a single IT Manager to deal with all things that fall under the IT umbrella.

Information Technology is a name that covers a very wide field of specializations; there is Networking, Database, Application Developers, Security and so on. For me, I have gone towards the path of security and have dedicated myself towards this field.

Sure, I may know some networking concepts, but I am not the right guy to deploy complex networking with various proprietary network protocols (FabricPath and QFabric comes to mind) or attempt to build and maintain a database.

Most of us can pull out the administrator guide and understand what all those text means. This helps us to do the basic stuff, like installing the application or service into the server, but that does not mean we know how it works.

Most small IT teams do their best to manage many things. Making sure everyone’s laptop and workstations are working normally, all business applications are installed, new users are created on the Active Directory with the right user roles, deploying security controls, maintaining the servers and cloud instances… the list is long. This does not mean they know how everything works, and usually they would ask the respective vendor or partner for assistance. This all works out well as all these activities can be planned and assistance can be arranged prior.

However, security is always a complex subject. Sure, there are tons of solutions out there that can be deployed and installed, but all these solutions are threat deterrence. Think of this as installing a gate for your home. The gate does not fully prevent people from breaking in, it just adds a layer of deterrence but would not stop an extremely determined individual from trying to break in. You can add CCTV cameras, but again, that does not stop the determined individuals and if no one is constantly watching the CCTV feeds, no one is going to react accordingly.

And unlike solutions that help to increase productivity and bring profit to organizations, security spending is often hard to justify when the management does not look at it from a risk perspective.

Fortunately, more organizations are starting to understand this, and more are building a structured IT team or getting outsourced services to help them out.

So please give the single IT personnel a break. He or she may not know everything about security and having the individual burnt at the stake for something beyond his or her expertise is uncalled for.

And to the very first question… No, I will not help you fix your computer.


Biography

Harvey Goh



Harvey Goh is a cyber security specialist having been in the cyber security industry for over 15 years as a technical personnel. Currently he is working as part of Sophos’ Managed Threat Response team. He is also a member of AiSP CTI SIG, EXCO and volunteer at CSCIS CTI SIG.

Views and opinions expressed in this article are my own and do not represent that of my places of work. While I make every effort to ensure that the information shared is accurate, I welcome any comments, suggestions, or correction of errors.