📜 ⬆️ ⬇️

Corporate insecurity

In 2008, I was able to visit one IT company. In each employee some unhealthy tension was read. The reason turned out to be simple: mobile phones - in the box at the entrance to the office, behind the back - the camera, 2 large additional “watching” cameras at the office and controlling software with the keylogger. And yes, this is not a company that developed SORM or aircraft life support systems, but simply an application software business developer, now absorbed, crushed and no longer existing (which seems logical). If you are now stretched out and think that there is no such thing in your office with hammocks and M & M in the vases, you can be very mistaken - just for 11 years, the control has learned to be inconspicuous and correct, without fights over the visited sites and downloaded movies.

So it is impossible without all this, but what about trust, loyalty, faith in people? Do not believe it, but companies without security tools, no less. But employees manage to squander both there and there - simply because the human factor is capable of destroying worlds, not just your company. So where can your employees come from?



This is not a very serious post, which has exactly two functions: a little to brighten up everyday work and to remind you of basic things that are safe and often forgotten. Oh, and once again remind you of a cool and secure CRM system - isn't such software a security edge? :-)
')
They drove in random mode!

Passwords, passwords, passwords ...


You speak about them and a wave of indignation rolls in: how so, how many times did they say to the world, but things are still there! In companies of all levels, from individual entrepreneurs to transnational corporations, this is a very sore point. Sometimes it seems to me that if tomorrow they build a real Death Star, there will be something like admin / admin in the admin panel. So what can we expect from ordinary users, for whom their own VK page is much more expensive than a corporate account? Here are the points to check:



It `s that? This thing keeps all my passwords.



The password is like underwear: change it more often, do not share it with your friends, long - better, be mysterious, do not scatter everywhere



My cat gives me great passwords! He walks on my keyboard

Physical access to cases


How do you organize access to accounting and personnel documentation (for example, to the personal affairs of employees) in your company? Let me guess: if a small business, then in accounting or at the boss in the office in folders on the shelves or in the closet, if large - in the personnel department on the shelves. But if it is very large, then most likely, everything is correct: a separate office or a unit with a magnetic key, where only certain employees have access, and to get there, you need to call one of them and enter this node in their presence. There is nothing difficult in making such protection in any business or at least learning not to write a password from an office safe with chalk on the door or on the wall (everything is based on real events, do not laugh).

Why is it important? First, workers have a pathological craving to learn about each other the most secret: marital status, wages, medical diagnoses, education, etc. This is such compromising in the office competition. And the squabbles that arise when designer Petya finds out that he gets 20 thousand less than designer Alice are completely at your hand. Secondly, in the same place employees can get access to the financial information of the company (balance sheets, annual reports, contracts). Thirdly, something elementary can be lost, spoiled or stolen in order to cover traces in his own work biography.

Warehouse, where someone loss, someone - treasure


If you have a warehouse, consider that sooner or later you will be guaranteed to encounter offenders - the psychology of a person is just like that, he sees a large amount of products and firmly believes that a lot of things are not robbery, but sharing. A unit of goods from this heap can cost 200 thousand, 300 thousand, and several million. Unfortunately, embezzlement cannot stop anything except pedantic and total control and accounting: cameras, acceptance and write-off by bar codes, automation of warehouse accounting (for example, in our Region CR CR CRM is organized in such a way that the manager and manager can see the movements goods in stock in real time).

Therefore, equip your warehouse to the teeth, ensure physical security from an external enemy and complete security - from internal. Employees in transport, in logistics, in the warehouse should be clearly aware that there is control, it works and just that they will punish themselves.

* uki, do not pop into the infrastructure of the hand


If the story about the server room and the cleaner has already experienced herself and long ago migrated to the bikes of other industries (for example, the same went about mystical disabling of the ventilator in the same ward), then the others remain a reality. Network and IT security companies in small and medium businesses leave much to be desired, and it often does not depend on whether you have a sysadmin or invited. The latter often does even better.

So what are the employees here capable of?



Maybe you want to look for a better security system? Not sure if this sign is enough


This is, of course, a base, because the IT infrastructure is the very place where the farther into the forest, the more firewood. And everyone should have this base, and not be replaced by the words “we all trust each other,” “we are family,” “yes, who needs it” - alas, for the time being.

This is the Internet, baby, there may know a lot about you


The safe handling of the Internet is time to enter into the course OBZH at school - and this is not about the measures in which we are immersed from the outside. This is exactly about the ability to distinguish a link from a link, understand where phishing is, and where a divorce is, do not open attachments of letters with the subject “Act of Reconciliation” from an unfamiliar address, without understanding, etc. Although it seems that schoolchildren have already mastered all this, but the staff is not. There are a bunch of tricks and mistakes that can endanger the whole company at once.





The next time you get a strange letter with a paperclip, do not click on it!


It seems to be all the little things. However, each of these little things can be disastrous, especially if your company is the target of a competitor's attack. And this can happen literally with everyone.


Chatty employees


This is the same human factor that you will be hard to get rid of. Employees can discuss work in the corridor, in a cafe, on the street, at a client talking loudly about another client, talking about labor achievements and projects at home. Of course, the likelihood of a competitor standing behind is insignificantly small (if you are not in one business center - this happened), but the fact that the guy who clearly sets out the business case will be removed on a smartphone and posted on YouTube, oddly enough. But this is garbage. It's not bullshit when your employees willingly present information about a product or company at trainings, conferences, meetings, professional forums, or at least on Habré. Moreover, it is not uncommon for people to specifically summon an opponent to such conversations in order to conduct competitive intelligence.

Indicative story. At a galactic-scale IT conference, the speaker of the section posted on the slide a complete diagram of the organization of the IT infrastructure of a large company (top-20). The scheme was mega impressive, just cosmic, almost everything was photographed, and it instantly flew through social networks with enthusiastic reviews. Well, and then the speaker caught on geotags, stands, social. the networks were postponed and begged to be removed, because they quickly got a call and said a-ta-ta. Chatterbox - a godsend for a spy.

Ignorance ... exempts from punishment


According to the Kaspersky Lab's global report for 2017, among enterprises that have experienced cybersecurity incidents for 12 months, one out of ten (11%) of the most serious types of incidents concerned negligent and uninformed employees.

Do not assume that employees know everything about corporate security measures, be sure to warn them, conduct training, make interesting periodic mailings about security issues, hold meetings for pizza and clarify the issues again. And yes, cool life hacking - mark all printed and electronic information with color, signs, inscriptions: trade secret, secret, for official use, general access. It really works.

The modern world has put the company in a very delicate situation: you need to strike a balance between the desire of an employee at work not only to plow, but also to get entertainment content in the background and strict rules of corporate security. If you turn on hypercontrol and debility tracking programs (yes, not a typo - this is not security, this is paranoia) and the cameras are behind your back, then employees' confidence in the company will fall, and maintaining trust is also a corporate security tool.

Therefore, know the measure, respect the staff, make backups. And most importantly - put at the forefront exactly safety, not personal paranoia.


If you need CRM or ERP - carefully study our products and match their capabilities with their goals and objectives. There will be questions and difficulties - write, call us, we will organize for you an individual presentation online - without ratings and puzomerok.
Our channel in Telegram , in which without advertising we write not quite formal things about CRM and business.

Source: https://habr.com/ru/post/446480/


All Articles