Feeds

Even brilliant sysadmins need help plugging holes

External audits fix issues you didn't know were there

Gartner critical capabilities for enterprise endpoint backup

Sysadmin blog While we must never allow ourselves to fall into the habit of thinking that security is somebody else's problem, the time has come to accept that external help is required.

We accept the necessity of outside help in many other areas of business. Yet even when IT security audits are offered at no cost, companies are still reluctant to take advantage. Where does the reluctance to seek specialty support in IT come from?

The cost of a data security breach is already expensive, and those costs are still rising. Let's not forget about Sony, whose recent security issues have shown that data breaches can cascade into insurance issues as well.

Intel seems to think that the data security threat posed by missing equipment is a big issue. Meanwhile the FBI seems to think that reinventing the wheel is a potential solution.

Some sectors have it harder than others, but nobody is immune. Not even the biggest and the best. Data security breaches are now so common that we can regularly compile humorous lists of the top10 massive security breaches.

Confidence is not enough; data security needs be studied objectively and measured as qualitatively as possible. It needs the tender care of professionals. A computer science degree or whichever diploma is attached to the milled masses of sysadmins stamped out of polytechnics each year is simply not enough.

Security audits of your company need to be done by people bearing certifications like CISSP, GISC, and CCNP Security. Audits should be done by teams that have individuals sporting many years of actual experience in the field.

There is no ubermensch; the modern polymath is a myth. No one IT director, CTO, CIO, systems administrator or any other designation can or ever will know everything there is to know about modern IT. It simply isn't possible.

A large enough company could theoretically assemble an IT team whose skills covered all the requisite areas – I expect IBM, VMWare and the like have some pretty top-flight nerds – but even the behemoths of IT get themselves into trouble.

For all our skills, knowledge and experience, we are all of us still human. Working with a system day in and day out makes you more familiar with than than an outsider, but it also makes you more likely to overlook subtle quirks or rationalise bad decisions made by bodies further up the food chain.

Sometimes, it takes that outside professional to get the brass to accept you've been right all along. Other times, another pair of eyes really is important. More often than not however, the guy whose job it is to do data security 24/7 will simply know details about issues you simply haven't had time to learn yet, busy as you are dealing with everything else.

External audits also bring an element of "cover your assets" to the table. If it all does go horrible pear-shaped, being able to stand up in front of the judge and say honestly "we did everything possible, including bringing in certified external experts, and following their advice" makes a huge difference should a lawsuit arise. Increasingly, it can also lead to lower business insurance premiums.

If you have an internet connection, then data security audits have become a fundamental cost of doing modern business - no matter who your company is, or what you do. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Flash could be CHEAPER than SAS DISK? Come off it, NetApp
Stats analysis reckons we'll hit that point in just three years
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
Object storage bods Exablox: RAID is dead, baby. RAID is dead
Bring your own disks to its object appliances
Nimble's latest mutants GORGE themselves on unlucky forerunners
Crossing Sandy Bridges without stopping for breath
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.