Security Must Stand Up to Bullying, Harassment

  /     /     /  
Publicated : 22/11/2024   Category : security


Security Must Stand Up to Bullying, Harassment


Todays IT security is about much more than data loss. Its time for the security group to embrace its role in protecting the people within the organization.



How far does enterprise security go? The news of late has been filled with stories of employees behaving very badly toward other employees. The real question is whether any of that behavior is a problem for the IT security group.
Back at the Black Hat conference in July, Alex Stamos, Facebooks chief security officer, gave a keynote address in which
he made a compelling case
for treating cyber stalking, bullying and harassing as an IT security problem rather than just an issue for HR.
The argument for involving IT security in these human behavior issues has several components; the behavior involves computers and networks, the victims and perpetrators are both using computers, and computer security has (or should have) as one of its goals the idea of minimizing the harm done to the organization by computers and their users.
When IT security takes on abusive use of its systems, several changes in thinking are required. The first change is from searching for traffic that damages the organizations data to looking for traffic that might damage the employees. The next is a change from being on guard primarily for technology-based attacks to guarding against behavior-based threats. But the foundation change is expanding and enhancing the definition of harm so that any of this matters to the IT security teams mission.
The most valuable asset
One of the catch-phrases of the modern business era is that data is an organizations most valuable asset. Well, thats when corporate management isnt telling potential and current employees that
people
are the organizations most valuable asset. If we just say that people and data are an organizations most valuable assets then its a straight-forward path from there to a position where IT security should be watching after the safety of both.
IT security is already keeping an eye on behavioral issues; just about every company now trains employees on ways to safeguard data and equipment when traveling or opening strange email messages. The security group will often amplify that with technology that looks for ill-considered user behavior and protects the organization to some extent from its effects. From a strategic point of view its a relatively small step from those actions to protecting users from bad behavior.
A most pervasive problem
Recent revelations make it clear that harassment, bullying and intimidation are far more common than most men were willing to admit -- women (and, in similar situations, individuals who are members of minority groups) have known about these horrible behaviors all along, even when organizational structures made it all but impossible for victims to talk about them. While much of the bahvior happens IRL (in real life, or face-to-face) the electronic trail that weve seen in several of these very public cases proves that IT is involved as the means for bad behavior in many instances.
IT can rightly take credit for many developments that have made organizations more effective and brought diverse viewpoints and experiences more fully into the business world. Its time for IT security to step up to protect those voice and the people who carry them so that all of us can continue to safely and confidently move forward.
Related posts:
Security by Discomfort
Magical Thinking Drives the Myth of AI Solving Security
Five Words for Black Hat
— Curtis Franklin is the editor of
SecurityNow.com
. Follow him on Twitter
@kg4gwa
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Security Must Stand Up to Bullying, Harassment