{"id":2497,"date":"2015-10-24T14:55:43","date_gmt":"2015-10-24T14:55:43","guid":{"rendered":"https:\/\/thebeagle.itgroove.net\/?p=2249"},"modified":"2023-02-24T21:39:40","modified_gmt":"2023-02-24T21:39:40","slug":"defense-in-depth","status":"publish","type":"post","link":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/","title":{"rendered":"Defense In Depth"},"content":{"rendered":"<p>I was watching an automotive program earlier today \u2013 Autoweek out of Detroit \u2013 and there was a panel discussion about how to protect automobiles from hacking attacks.\u00a0 And during the discussion there were terms being thrown out that resonate in the IT world, just as they always have, with the most resonant being \u201cDefense in Depth\u201d.\u00a0 This is a term that I have heard again and again over close to 35 years in this wacky business.<\/p>\n<p>To over-simplify a complex concept, Defense in Depth means you have layers of security in place within your IT infrastructure.\u00a0 You don\u2019t simply install a firewall and announce that you\u2019re done; rather, you have firewalls and anti-virus and anti-malware and secured wi-fi and segmented networks and security policies and local machine firewalls and so on and so forth ad infinitum.\u00a0 You build your castle and moat to keep the bad guys out.\u00a0 And while most larger enterprises \u201cget it\u201d and do this, many smaller organizations do not.\u00a0 And, to add fuel to the fire, everything \u201cCloud\u201d adds another layer of complexity to the situation.<\/p>\n<p>To be very clear, there is only so much any organization can do to protect their systems.\u00a0 There is no such thing as \u201cperfect security\u201d regardless of what many might tell you.\u00a0 The bad guys are always working to find new ways to defeat the security systems and the good guys, meaning most of us human beings, are generally sloppy.\u00a0 So it is the job of the IT pro\u2019s to do as much as they can, with management\u2019s backing, to build as secure a system as organization size and budget will allow.<\/p>\n<p>So, how does a small organization do this?\u00a0 How do you build defense in depth?\u00a0 I think the answer is actually pretty simple; you do what you can from a technology point of view and then you educate the hell out of your people!\u00a0 It may sound odd but a big part of the problem is actually simple ignorance on the part of your users.\u00a0 Most users simply don\u2019t have any idea about the relative dangers of borrowing their kid\u2019s USB stick to transport a file from home to work or, worse, why you shouldn\u2019t let your 10 year old use your work laptop!\u00a0 This isn\u2019t a slam against the kids, it\u2019s just a simple statement of fact.\u00a0 Uncontrolled access to organizational assets is a very big problem.\u00a0 As an organization you can put all sorts of defenses in place such as anti-virus and anti-malware scans but this just isn\u2019t enough if your users ignore all the rules.<\/p>\n<p>Definitely add the technology that you can afford &#8212; install the UTM firewall, install commercial-grade anti-virus and and-malware systems (no, the free stuff just isn\u2019t good enough), control access to USB ports on client machines, secure and segment your wi-fi, ensure you have domain security controls in place regardless of where the domain lives on-prem or in the Cloud, control and secure remote access to your resources.\u00a0 But, most of all, <em>educate your users!<\/em>\u00a0 If your users understand the <em>why<\/em> behind a security policy then they usually will do their best to comply with it.\u00a0 Security policies fail when users have no clue why you have made their lives \u201cdifficult\u201d.<\/p>\n<p>Small organizations generally don\u2019t have the high profile that invites external parties to \u201cattack\u201d their systems.\u00a0 The threats that small organizations face come more from ignorance, the suspicious email that carries a cryptolocker-style payload when opened or the infected USB stick that gets plugged into the network.\u00a0 Education is your biggest defense against these kinds of attacks.\u00a0 it is one more layer in your defense in depth.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was watching an automotive program earlier today \u2013 Autoweek out of Detroit \u2013 and there was a panel discussion about how to protect automobiles from hacking attacks.\u00a0 And during the discussion there were terms being thrown out that resonate in the IT world, just as they always have, with the most resonant being \u201cDefense &hellip; <a href=\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/\"><\/a><\/p>\n","protected":false},"author":10,"featured_media":2109,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[49],"tags":[356,375,437],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Defense In Depth - Archive<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defense In Depth - Archive\" \/>\n<meta property=\"og:description\" content=\"I was watching an automotive program earlier today \u2013 Autoweek out of Detroit \u2013 and there was a panel discussion about how to protect automobiles from hacking attacks.\u00a0 And during the discussion there were terms being thrown out that resonate in the IT world, just as they always have, with the most resonant being \u201cDefense &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/\" \/>\n<meta property=\"og:site_name\" content=\"Archive\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-24T14:55:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-24T21:39:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2014\/11\/halt-clipart-halt-man-md-e1442701865399.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"184\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sean Wallbridge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Wallbridge\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/\",\"url\":\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/\",\"name\":\"Defense In Depth - Archive\",\"isPartOf\":{\"@id\":\"https:\/\/regroove.ca\/archive\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2014\/11\/halt-clipart-halt-man-md-e1442701865399.png\",\"datePublished\":\"2015-10-24T14:55:43+00:00\",\"dateModified\":\"2023-02-24T21:39:40+00:00\",\"author\":{\"@id\":\"https:\/\/regroove.ca\/archive\/#\/schema\/person\/74e1c0def190f181c1394c2b6d883e77\"},\"breadcrumb\":{\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#primaryimage\",\"url\":\"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2014\/11\/halt-clipart-halt-man-md-e1442701865399.png\",\"contentUrl\":\"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2014\/11\/halt-clipart-halt-man-md-e1442701865399.png\",\"width\":200,\"height\":184},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Archive\",\"item\":\"https:\/\/regroove.ca\/archive\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defense In Depth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/regroove.ca\/archive\/#website\",\"url\":\"https:\/\/regroove.ca\/archive\/\",\"name\":\"Archive\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/regroove.ca\/archive\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/regroove.ca\/archive\/#\/schema\/person\/74e1c0def190f181c1394c2b6d883e77\",\"name\":\"Sean Wallbridge\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/regroove.ca\/archive\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adf8cea6291c39d166616f2148d919a6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adf8cea6291c39d166616f2148d919a6?s=96&d=mm&r=g\",\"caption\":\"Sean Wallbridge\"},\"url\":\"https:\/\/regroove.ca\/archive\/author\/swallbridge\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defense In Depth - Archive","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/","og_locale":"en_US","og_type":"article","og_title":"Defense In Depth - Archive","og_description":"I was watching an automotive program earlier today \u2013 Autoweek out of Detroit \u2013 and there was a panel discussion about how to protect automobiles from hacking attacks.\u00a0 And during the discussion there were terms being thrown out that resonate in the IT world, just as they always have, with the most resonant being \u201cDefense &hellip;","og_url":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/","og_site_name":"Archive","article_published_time":"2015-10-24T14:55:43+00:00","article_modified_time":"2023-02-24T21:39:40+00:00","og_image":[{"width":200,"height":184,"url":"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2014\/11\/halt-clipart-halt-man-md-e1442701865399.png","type":"image\/png"}],"author":"Sean Wallbridge","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sean Wallbridge","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/","url":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/","name":"Defense In Depth - Archive","isPartOf":{"@id":"https:\/\/regroove.ca\/archive\/#website"},"primaryImageOfPage":{"@id":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2014\/11\/halt-clipart-halt-man-md-e1442701865399.png","datePublished":"2015-10-24T14:55:43+00:00","dateModified":"2023-02-24T21:39:40+00:00","author":{"@id":"https:\/\/regroove.ca\/archive\/#\/schema\/person\/74e1c0def190f181c1394c2b6d883e77"},"breadcrumb":{"@id":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#primaryimage","url":"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2014\/11\/halt-clipart-halt-man-md-e1442701865399.png","contentUrl":"https:\/\/regroove.ca\/archive\/wp-content\/uploads\/sites\/6\/2014\/11\/halt-clipart-halt-man-md-e1442701865399.png","width":200,"height":184},{"@type":"BreadcrumbList","@id":"https:\/\/regroove.ca\/archive\/2015\/10\/24\/defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Archive","item":"https:\/\/regroove.ca\/archive\/"},{"@type":"ListItem","position":2,"name":"Defense In Depth"}]},{"@type":"WebSite","@id":"https:\/\/regroove.ca\/archive\/#website","url":"https:\/\/regroove.ca\/archive\/","name":"Archive","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/regroove.ca\/archive\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/regroove.ca\/archive\/#\/schema\/person\/74e1c0def190f181c1394c2b6d883e77","name":"Sean Wallbridge","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/regroove.ca\/archive\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adf8cea6291c39d166616f2148d919a6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adf8cea6291c39d166616f2148d919a6?s=96&d=mm&r=g","caption":"Sean Wallbridge"},"url":"https:\/\/regroove.ca\/archive\/author\/swallbridge\/"}]}},"_links":{"self":[{"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/posts\/2497"}],"collection":[{"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/comments?post=2497"}],"version-history":[{"count":1,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/posts\/2497\/revisions"}],"predecessor-version":[{"id":2776,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/posts\/2497\/revisions\/2776"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/media?parent=2497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/categories?post=2497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/regroove.ca\/archive\/wp-json\/wp\/v2\/tags?post=2497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}