Using common sense to stay secure with Joe Dietrich
Release Date: 01/11/2021
Security Strong Podcast
In this in-depth Security Awareness Training, host Jeremy Cherny explores how a security incident can occur, as well as how people can best protect their data to remain secure.
info_outline Get To Know Microsoft TeamsSecurity Strong Podcast
Host Jeremy Cherny discusses how to use Microsoft Teams as well as best practices. What is Microsoft Teams? If you haven't used it before, Microsoft Teams is a bit like texting or messenger on your phone in that it allows you to send messages to individuals, create group chats, and share files such as PDFs or photos. It’s much more than just that though. You can also create video chats for things such as one on ones, group chats, meetings, or video conferencing and because Teams can access apps such as SharePoint, Planner, and OneNote just to name a few, your team can work...
info_outline Get to know Microsoft PlannerSecurity Strong Podcast
Host Jeremy Cherny discusses best practices and how to use Microsoft Planner. What is Microsoft Planner? Microsoft Planner does not have a desktop component, it is strictly from the web. It's also from your apps on your phone and tablets. So right now, there is no desktop component. So you go to Office and sign in with your credentials. It's kind of like task management for teams. Some might call it light project management. There are a lot of different ways to look at it depending on how you're going to use it. We've started to use it here at Tobin Solutions for a few small projects. So we...
info_outline What to expect from the future of Internet security with Steve MoscarelliSecurity Strong Podcast
Host Jeremy Cherny interviews Steve Moscarelli, Regional Sales Manager at Thales Cloud Security “I knew that the internet was going to be the future when I was in college. I had roommates working at the New Media Lab at MIT and they were involved in building a precursor to the internet for DARPA. I also saw very clearly that the internet was built with no security at all - which really propelled me into my career.” What are some of the things you read to stay on top of what's happening in the world of security? So I'd recommend that everybody pay close attention to Dark Reading. In many...
info_outline Using common sense to stay secure with Joe DietrichSecurity Strong Podcast
Host Jeremy Cherny interviews Joe Dietrich, Manager of Hosting and Storage for Dover Corporation “Dover Corporation is a diversified global manufacturer. We've got about 325 global locations with about 23,000 employees worldwide. What I do for Dover is lead teams that provide server and storage support, as well as Active Directory support and what we call data protection, which for us means backup and disaster recovery.” Why is security important? The systems and applications that run on the servers and storage that my team supports are things like Oracle, our payroll, our accounting...
info_outline Best practices for keeping your business’ information secureSecurity Strong Podcast
This week, we're doing something a little different on the Security Strong Podcast. It's just me, we're doing kind of a fireside chat mode here. I'm sitting in a rocking chair near the fire and I am thinking about the various awesome guests we've had since we started the podcast, I'm thinking about what we do as a security company, and I thought why don't we share some of the best practices and go through a top list of things that you can do to stay secure. Security as a Process, Not a Product A lot of times when people think about security, they're thinking about buying the basics,...
info_outline Security in the world of HR with Amy FalluccaSecurity Strong Podcast
Host: Jeremy Cherny interviews Amy Fallucca, CEO of Bravent “Bravent has been around for about four years. We are an HR consulting and recruiting company. On the HR side, we help with anything from handbooks, to advising on terminations, or employee performance. Then on the recruiting side, we work on a range of positions; professional, technical, and executive. We leverage technology to be really efficient in our process, and by doing that, we're able to save our clients money. We're typically about half the cost of contingent placement firms.” Can you speak a little about security...
info_outline Improve security through Mobile Device Management with Max PalzewiczSecurity Strong Podcast
Host Jeremy Cherny interviews Max Palzewicz, Director of Operations at Rocketman Tech “I started out my career in public accounting, primarily working and advising small business owners. I got my CPA and I was able to join my dad and uncle's business coaching firm, Action Coach of Southeastern Wisconsin, where I worked for a few years. I carved out a niche for myself focusing on the financials for business owners, teaching business owners, how to be financially literate, how to read and analyze their financial statements, also how to process good numbers so they could make sound decisions...
info_outline Know your data with Jason ClaycombSecurity Strong Podcast
Host: Jeremy Cherny interviews Jason Claycomb, Founder of INARMA “INARMA is a professional services firm. The short tagline is ‘We assess controls.’ So I really like how you think of security as a process and not a product - that’s exactly what we do. We help people with the process around security. Yes, there are products involved, but those are types of solutions and we help people pick the right solutions.” Why is security so important to you and your clients? We've all got sensitive data. There isn’t any business that does not have sensitive data in it or where the data isn't...
info_outline E-commerce website security with Lori McDonaldSecurity Strong Podcast
Host: Jeremy Cherny interviews Lori McDonald, President and CEO of Brilliance Business Solutions “I started my career at NASA Johnson Space Center as a flight controller for the space shuttle program where I met my husband. He went on to work for Rockwell Automation and got a promotion that brought us to Milwaukee. I was trying to figure out what was as cool as space and decided the internet looked like a cool place to be. So I started Brilliance Business Solutions, a web development company with a niche in helping manufacturers and distributors implement digital commerce solutions, in 1998....
info_outlineHost Jeremy Cherny interviews Joe Dietrich, Manager of Hosting and Storage for Dover Corporation
“Dover Corporation is a diversified global manufacturer. We've got about 325 global locations with about 23,000 employees worldwide. What I do for Dover is lead teams that provide server and storage support, as well as Active Directory support and what we call data protection, which for us means backup and disaster recovery.”
Why is security important?
The systems and applications that run on the servers and storage that my team supports are things like Oracle, our payroll, our accounting software. Those programs are used to not only produce drawings for parts but actually deliver those drawings and blueprints to the shop floor so that they can do what we call cut chips. This means they can actually make parts. This means that security is a key infrastructure. When these programs go down or are unavailable the company stands to lose significant amounts of money.
I know you don't always work directly with the end-users, you've got the teams you manage, how do you guys stay on top of security threats?
This is going to sound very rudimentary but every place that I've worked, this has been a bit of a struggle. The first thing you need to do is understand what you have. You need to have a very solid list of the systems that you support. We start with that list because you can't secure what you don't know. For example, you don't know how big to build your fence if you don't know what you're trying to build it around. So it's extremely rudimentary, but it's just looking at what is the list of things that I'm responsible for? So you can then take that list and you can say, “Okay, I see I've got 1000 servers. Okay. Do I have an antivirus on all those servers? Do I have them reporting to things like OpenDNS? Or are they sending their logs to Splunk?”. So you can't really understand or you can't really secure things until you know how many things you have.
Do you ever find that people have blind spots? Like something where someone says, "Oh, where'd this asset come from?"
Absolutely. I know you've been in the business long enough to remember when, if you wanted a server, you bought a physical server. I remember when I came in, servers were monsters, you could not really lose that because they weighed 150 pounds. Now, especially with the proliferation of cloud technologies like Azure, AWS and Google Cloud, it is so easy to spin up new environments. It really just takes a credit card and a few mouse clicks and you can have a 1000 server farm sitting in Azure. So what we see sometimes is what we consider shadow IT. Shadow IT is where somebody in the engineering department wants to test something out, and they go to aws.com, and they spin up an environment for themselves. They've made it so simple, which is great. It doesn't take the same level of knowledge that it used to actually put in those floppy disks to install. We absolutely see that sometimes and the key then is to make sure that you educate people as to why even though it's so convenient and so easy, it might not be a good idea for the business.
How do you educate them? How do you keep your team informed on those kinds of things on security awareness?
It's hard because as you know, new technologies are being spawned daily, which makes knowing everything impossible. What we try to do is make sure that as things come up from the various thought leaders throughout our department and some of our trusted partners, that we're getting that knowledge out there either via email, meetings, maybe pieces of training, that kind of thing. We really try to get as much information to the folks on the frontline as we possibly can.
What are some of the things you see that people can do to protect their data online?
Communication is always key. What I mean by that is if you're a small shop, and you've got maybe one IT person, making sure that that person is well-known throughout the company and is seen as someone that's a trusted resource so that somebody won't just go to AWS or Azure and spin stuff up. They'll stop by that person’s desk or they'll ping them on Teams, Skype or whatever, and just say, "Hey, I've got this idea," or "What do you think about this?" That communication is so important so that people don't feel like IT is a roadblock. People understand that IT is really a business accelerator so I think that that's really important. You talk about staying secure online, and a lot of it is just common sense stuff. A lot of people can't even understand what IT professionals do. Well, a lot of it is just extremely common sense. Take the time to read something, take the time to look at links, look at what it’s asking you to do. If you're getting emails and they’re supposedly coming from your boss, read them with a critical eye. If they're using phrases that your boss doesn’t normally use, and they're trying to get you to go around a process and just wire money somewhere that’s probably not your boss. I think part of our problem now is that we always have so much information coming at us that we just zip through things so quickly. We're scrolling through our feed of whatever it might be. It's emails that we don't sit there and read and say, hold on, you know, "Jeremy's emailing me now, and he just used a phrase I've never heard him use." Or it could be something as simple as you know, he spelled "color", but he spelled it "colour," and I've never seen him do that before, is this really him? So I think that time to maybe just slow down for a second and be critical, read things critically is so key. It's not a technology, it's just more common sense stuff.
Do you have any war stories you can share or anything where you guys had an issue or something you maybe even heard of from one of your partners that our listeners would benefit from?
Yeah, absolutely. Unfortunately, it kind of follows the theme of my last answer. We had somebody in a payroll department that saw one of these emails that were supposedly coming from a customer saying, "Hey, we've changed our banking information, now we want our payments to be sent here." Unfortunately, the person I think was trying to just rush through things and they updated that information into the system. This was something where they sent payments of a pretty substantial amount that just got sent into the ether and then they were gone. There was no recourse. If I remember correctly, it was sent outside the US and the laws and the ability of the US to reach out and reclaim this money is limited. So it was, somebody just rushing through things and not reading it with a critical eye. That's actually where I got that example of “color” vs “colour,” it was actually from that. It was supposed to come from somebody that they had been speaking to, and they just didn't read it critically, and unfortunately, it was a substantial monetary problem.