Skip to Main Content

The University of Tennessee

UT/Institute for Public Service



Monday, October 22, 2012

Guest Blog from Justin O'Hara

Justin O'Hara is a member of the Leadership Academy, Session Two. One of their assignments is to write an article for the IPS blog. This is Justin's post.

IT Security - What does this mean to each of us?


 

Because this is one of my responsibilities as the IT guy, I explore better ways to protect the IT resources of MTAS, as well as IPS as a whole.  Some probably describe me as a little paranoid.  I have met other IT security people, however, who make my paranoia look minor.  When you see some of the stuff they show at security conferences and presentations, you would understand the paranoia. Keep in mind that many organizations have breaches every day.  Some are minor, but many others bloom into large financial losses as well as losses of Intellectual property.  Most of these breaches can go unnoticed for long periods of time.  The clean-up and recovery can be time and resource intensive, easily adding to the monetary losses.  Many security breaches only involve a loss to the institution involved and are never publicized, for obvious reasons.  My goal for this blog post is to help everyone become a little more paranoid.  

 

Security is like an onion.  You want to have multiple layers of security to protect your resources, depending on how valuable (not necessarily monetary) the data/asset is that you are protecting.  UT has improved its defenses exponentially since I started working here 12 years ago.  UT has taken this layered approach, which includes everything from software (Anti-Virus and software firewalls) at the user/pc level all the way up to hardware devices (Hardware firewalls and Intrusion Prevention Devices) that protect the data at the network layer.  All of this security is a great tool, but none of it is a panacea.  All of it can be broken or made useless by an experienced and determined hacker.  The weakest link in this layered approach is always identified as the users of the devices. 

 

It always makes me cringe to hear that users are the weakest link, as I am also part of the user group.  Am I really as likely to cause a breach as any other user?  Are you someone who could/would cause a breach?  The answer to both questions is YES!  I am one of the users who is most targeted because I have security credentials that would give a hacker elevated privileges.  Hackers will compromise a system with a Trojan or worm through phishing, spear phishing, or a trusted website advertisement. Once they have access to lower level systems, hackers will install a key logger that tracks all the key strokes on a system and sends them home to the hacker.  Then, an administrator level person logs into the infected PC to troubleshoot the issues or fix the PC.  The hacker will later harvest the data and use the elevated credentials to infect a higher level server or PC and the process continues.  

 

What can you do about this?  The IPS IT team has tried to be as proactive as possible, giving you tools to protect your PC and the data on each system.  We have also taken many steps to protect our server resources.  So for each of you, the main thing you can do is remain diligent.  Here are a few suggestions:

·        Never trust an email that asks for NETID credentials or for any userid/password combination for other sites.  No bank, website, business, etc. will ever send you an email asking you to supply this information.  Even question when a link to a website opens and ask you for this information.  Some of these phishing emails are very well created or copied. I got one from Verizon recently that looked very official.  (Don't use email links; go to the website yourself and log on)

·        Some of these false information requests also occur over text messages on smart phones.

·        Ask your IT support person or the help desk questions, if you are unsure.  If you get an email that you think is phishing, the best place to start is with the OIT help desk at 865-974-9900.  They can walk you through sending the email to them so that it can be researched by the OIT security group and can be blocked or further steps taken, if necessary.   

·        Do not use an administrative level account on your PC for normal day to day work.  This is the main access point into systems for a security breach.  If you are running as a User level account, most breaches cannot occur and if one does happen, the fix is much quicker and easier to resolve.  Data loss is significantly reduced.  If you are currently running as an Admin user, you should contact your IT support person to discuss your options.  Also, if you have a home PC, I would demote your everyday account to a user account and add a new account to have admin privileges.  By default, Windows 7 prompts you to be set up this way.  Make this change as soon as possible.  

·        Accept personal responsibility because our software and hardware protection systems are great, but our goal should be for our end users to be the strongest link in the chain.

 

If you have questions talk with your IT support person.

 

October is National Cyber Security Awareness Month.  Join me in signing the MS-ISAC pledge and raising the awareness of cyber security with others.


 

Here are some additional tips for both your pc and mobile devices.  


 

No comments:

Border Photo

Institute for Public Service
105 Student Services Building
Knoxville, TN 37996
Phone: (865) 974-6621