<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.supl.co.uk/blogs/security/feed" rel="self" type="application/rss+xml"/><title>Supl - Thoughts , Security</title><description>Supl - Thoughts , Security</description><link>https://www.supl.co.uk/blogs/security</link><lastBuildDate>Thu, 03 Apr 2025 23:15:01 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Vertical v Horizontal]]></title><link>https://www.supl.co.uk/blogs/post/Vertical</link><description><![CDATA[Technology is not just for nerds]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_iR6hbecaQZ6fnL3M0MQ5YQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_FNH3RM4DTjWTeW51AJvxAg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_x_Lwr4wsS3yj5raZSXD01A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dKT3R8lvS_G3acJBQ5qwkw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dKT3R8lvS_G3acJBQ5qwkw"].zpelem-text{ border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;font-size:11pt;"><img src="/Karen%20-%20Simon%20-%20Websized-3.jpg" style="width:98px;height:147.5px;"><br></p><p style="text-align:left;font-size:11pt;"><br></p><p style="text-align:left;font-size:11pt;"><span style="font-size:11pt;">Looking at the world in the early 21st Century, it's possible to see things in two different ways: on the one hand, you have the vertically-delineated world of nations.&nbsp; Indeed, many of the recent developments in politics can be seen as the reinforcement of the age-old relevance of the nation-state - Brexit, Trump, Chinese sabre-rattling etc.&nbsp; On the other hand, however, there are plenty of things that seem to work horizontally, cutting across national boundaries: environmental measures, pandemics, financial markets and technology.</span><br></p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">The issue comes when you try to square the vertical with the horizontal.&nbsp; And it's an issue that gets ever bigger, as the horizontal forces grow stronger.&nbsp; I wrote in an earlier blog about the risks that populism pose for the cloud architecture, depending as it does on borderless access.&nbsp; The risk flows the other way too, as the supranational challenges of the environment, financial stability, the pandemic and the internet could render a national government superfluous, save for the assiduous execution of multilateral accords.&nbsp; Wriggle as it might, the UK government's efforts to &quot;take back control&quot; have simply highlighted how little room for manoeuvre there is to plough its own furrow - its trade, welfare, and fiscal policies all look remarkably similar to its neighbours'.&nbsp; The danger is that governments try to camouflage their limited power by popinjay politics, picking fights with those aspects of the multilateral norms that suit domestic opinion polls.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">It is interesting that, as horizontal influences strengthen, so do our powers of denial.&nbsp; I have written before about the extraordinary sniffiness many in the UK have towards technology and numbers:&nbsp; it's a badge of honour to be pap with machines.&nbsp; We also call this horizontal march &quot;globalisation&quot;, as if conveniently to label it as a conscious (and deliciously reversible) policy.&nbsp; Our talking shop parliaments, filled with talkers, wish for a world controllable by talk.&nbsp; Sadly, the logic of global capital markets and technology do not listen to talk, and certainly not national talk.&nbsp; Much as we would like to define our own versions of these things, it is doomed and as parochial as those in English regions and cities who fought to keep local time in the face of the march of the railways in the Nineteenth century.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">How are the horizontal influences strengthening?&nbsp; In addition to culture, the existence of the nation state owed much to its necessity: To do some<span style="font-style:italic;">thing</span>, you needed to be some<span style="font-style:italic;">where.&nbsp; </span>That is rapidly becoming unnecessary.&nbsp; Even internet access, hitherto dependent on local infrastructure (and so local control) will increasingly be available anywhere you can see the sky, which is frightening the heebiegeebies out of the Russian and the Chinese governments.&nbsp; Travelling?&nbsp; The infrastructure needed to do so internationally inevitably invokes a border trigger (bar the odd smuggler).&nbsp; What happens when a VTOL drone can move you 300 miles? Ordinary (if wealthy) people can then make their travel arrangements free of government purview, in the same way as the advent of the eurobond market created &quot;moneyland&quot; for people's financial arrangements.&nbsp; My point is not that these developments are good or bad (and, in the case of money, it has definitely caused issues), but that they will come, and will necessitate a reaction better than denial.&nbsp; </p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">How do hyper-vertical organisations react?&nbsp; The history of national tax agencies in the teeth of moneyland shows how hard it can be.&nbsp; Even the Americans now see the benefits of international cooperation on tax, which perhaps shows the way for other agencies.&nbsp; The UK's first attempt at carbon pricing will mean nothing until it builds the links to the European equivalent, for instance.&nbsp; Perhaps the most interesting challenge lies with those vertical institutions whose role is at least in part, the opposite of cooperation: national armed forces.&nbsp; Possessing an ancient hammer, there is a danger that everything continues to look like a nail - cyberspace becomes just another vector of battle, they might say.&nbsp; Except that it isn't: warfare in this space is like a competition to chuck the most powerful brew down a communal well - everyone ends up poisoned.&nbsp; Almost all the most damaging cyber incidents that we know about that have affected the West - Notpetya, Wannacry - contained major elements actually first built by Western Cyber Agencies.&nbsp; They are on the horns of a particularly difficult dilemma.&nbsp; They are paid to be the State's ultimate insurance, standing up to threats and possessing the nation's monopoly of violence.&nbsp; In that context, they are pushing back against authoritarian regimes like Russia and China.&nbsp; But in so doing, they unwittingly become those nations' accomplices in the strengthening of national boundaries that cut across the global technology commons, a commons profoundly dangerous to authoritarianism.&nbsp; And in so doing, they might find themselves more at home with their adversaries' social and patriotic values than those of the people they are paid to defend.</p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;font-size:11pt;">&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 17 May 2021 15:51:17 +0000</pubDate></item><item><title><![CDATA[Need-To-Know in the 21st Century]]></title><link>https://www.supl.co.uk/blogs/post/need-to-know-in-the-21st-century</link><description><![CDATA[We've got things round the wrong way]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_EJwVVKPIRwWZ3ikgTlLCOQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Pvs25TKmQPKQrkNQJuTH6g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_AC1wGM5cRk6zdPPf9tqmzQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_VXlSWY6DSt2TFgJ2TSWf4A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VXlSWY6DSt2TFgJ2TSWf4A"].zpelem-text{ border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;font-size:11pt;"><img src="/Karen%20-%20Simon%20-%20Websized-3.jpg" style="width:109px;height:164px;"><br></p><p style="text-align:left;font-size:11pt;"><br></p><p style="text-align:left;font-size:11pt;">I thought I would put pen to paper about this SolarWinds attack.&nbsp;As ever with Supl posts, this is not designed for the IT community, but rather its business masters: trying to put the attack into some sort of historical context, and offering some thoughts as to how we should move forward.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">The point is that we have built our Networks the wrong way round.&nbsp;Rather than groupings of computers, our networks should be built around trusted people and the information they need and share.&nbsp;</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">There has been some excellent technical analysis of what we know of the hack so far: the consensus is that whilst the attackers were sophisticated (particularly in the way they kept their tracks hidden), the methods by which they gained access were probably age-old and pretty basic, requiring no degree in computer science to understand.&nbsp;Somewhere in the SolarWinds estate sat a server that had missed being fully patched, and a bit like a careless zebra getting itself separated from the herd, it was brought down by the marauders.&nbsp;Other parts of the hack were also age-old: in the 1970s British Intelligence had the sense to recruit the IRA's head of internal security, giving him the perfect cover, he had access to all areas and was able to act with broad impunity - would you question the ultimate hardman?&nbsp;Likewise the KGB were clever enough to position Kim Philby as the head of the section in M16 to counter the Soviet threat.&nbsp;Wind forward to the 21st century, and SolarWind's Orion product was the virtual equivalent: Designed with counterintelligence in mind, it had access to all areas, and impunity to execute.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">What's the prognosis?&nbsp;Pretty awful, if truth be told.&nbsp;Although the Wannacry ransom ware attack was, on the face of it, more disruptive, at least such disruption was its obvious exhaust.&nbsp;In this case, the objectives were likely to be more insidious (information not a ransomware attack), and so there will never be a point when these networks can be considered &quot;clean&quot;.&nbsp;If that sounds apocalyptic, perhaps it is the opposite.&nbsp;Finally the risk of doing things differently might be lower that muddling along as usual.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">What does doing things differently look like?&nbsp;Spoiler alert: I have no special abilities to know the future, nor am I trying to sell a tech product that fixes things - that is how we got into this mess in the first place.&nbsp;Rather I see my job as asking the stupid, fundamental questions to tease out those answers, free from the shackles of narrow, deep technical knowledge, or (I hope) bound by the prevailing orthodoxy.&nbsp;</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">It is interesting to note that just as the past offered a good guide to the attackers, so it does to the defenders.&nbsp;Many years ago soldiers learnt that to build a thin protective crust that did not distinguish between low and high value assets was asking for trouble: rather they learned to defend in depth, accept and exploit the inevitable enemy incursion, and make sure that the dominant hill in your terrain was the one you concentrated most of your defensive resources on.&nbsp;The digital world, not overly stuffed with historians, has singularly failed to learn this lesson.&nbsp;I give you the Network, a collection of connected computers: a digital crust.&nbsp;</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">Interestingly, even the soldiers I talk to do not question this digital orthodoxy, equipped as they are with centuries of relevant (and clashing) experience.&nbsp;Perhaps their cultural conservatism leads them to favour something where there is a&nbsp;&quot;them&quot; and &quot;us&quot;.&nbsp;The Network provides such topography, but it is an illusion.&nbsp;In technology (as in financial markets and the environment), in the words of one cultured West Coast executive, &quot;we all use the same shit&quot;.&nbsp;Thus the challenge more akin to managing a global commons than manning the trenches.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">It is good to go back to first principles.&nbsp;What is technology for? Essentially, it is to ensure that trusted people can find stuff out to do their jobs.&nbsp;They don't require stuff that they don't need for their job, and if they don't have a job to do, then they should have no access to anything.&nbsp;Simples.&nbsp;Once you bring it back to those two things - people and stuff - you realise that computers are just the support act.&nbsp;Except the Network is predicated the opposite way around, as it is a design that places computers at the centre, pushing people and stuff to an afterthought.&nbsp;With computers at the centre, you need other computers to manage them, using ever-sophisticated (and impenetrable) means to do so.&nbsp;You only need to corrupt one computer to allow it to potter about among all the other computers, asking questions that would be impossible for a person to pull off if not accredited.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">So, to the stuff.&nbsp;Too much stuff is parcelled into documents, managed by little programmatic actors that may or may not be corrupted (word, excel etc).&nbsp;This is because most companies pay little strategic heed to how their stuff is organised and described, leaving it to each generation of middle management to reinvent the wheel.&nbsp;Converting stuff to a long-term home in a secure data store will not only improve confidentiality, it will ensure that the business learns as it goes, becoming wiser.&nbsp;</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">Then, onto the people.&nbsp;Once the stuff is safely inside a datastore (somewhere that allows for the storing of data and the recording of interaction about those data in context), then it becomes possible to organise it such that people have access only to that part of the datastore that they require to do their jobs - let’s call it need-to-know.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">What of the computers?&nbsp;Given the stuff is in one place, and the groups of people connected through their access to the stuff, then computers can be relegated to acting as binoculars and so do not need to be connected to other computers.&nbsp;</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p><span style="color:inherit;"></span></p><p style="text-align:left;font-size:11pt;">This begs so many questions, of course.&nbsp;It cuts across so many cultural mores - surely the Network is an Asset that is in physical form, “here” as opposed to “there”?&nbsp;It also shows up a glaring skills gap in most large enterprises: add up the Network engineers and the IT security people, and divide them by the number of specific information specialists, and you probably have a number in excess of 100.&nbsp;Too difficult?&nbsp;SolarWinds tells us we have no alternative.&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 21 Dec 2020 18:03:57 +0000</pubDate></item><item><title><![CDATA[Information Security]]></title><link>https://www.supl.co.uk/blogs/post/information-security</link><description><![CDATA[There's more to it than you think...]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QP-v4naWTf2dwyL8f5tdQQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Nlh48K4VSDOZ5nMg_Hqi_A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_tsFzrjk_Q1GB9hHDbCDjUQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_X-fxIr50TMeNHuXjshCu9w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_X-fxIr50TMeNHuXjshCu9w"].zpelem-text{ border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;font-size:11pt;"><img src="/Karen%20-%20Simon%20-%20Websized-3.jpg" style="width:102px;height:153.5px;"><br></p><p style="text-align:left;font-size:11pt;"><br></p><p style="text-align:left;font-size:11pt;">Oh no, I hear you say.&nbsp; Another exhortation from someone in IT about how I should not write passwords down/have unique ones/not click on dubious emails.&nbsp; Not so fast!&nbsp; It's actually to make the point that the risk picture for information is much more nuanced than IT would have you believe.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">Notice that I use the word <span style="font-style:italic;">information</span>, not the acronym IT: they are two different things.&nbsp; For a start, most security policies start and stop at the frontiers of the technology: how many businesses properly have controls on what papers can be carried out of the office?&nbsp; In many ways, more dangerous - they can be read without a password and cannot be remote-wiped.&nbsp; Secondly, mistaking IT for information means that businesses have outsourced the management of their information to computer people, who (typically) prefer the binary of the motherboard to the ambiguities of real life.&nbsp; Thus they have built networks of technology into The Network, centered around the needs of those who manage that Network, not those for whom technology is supposed to serve.&nbsp; Everything becomes deliciously un-nuanced: things are either On the Network or Off It, trusted or not.&nbsp; The only risk becomes one of penetration.&nbsp; Simples.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">Except it's not in the real world.&nbsp; Even before this COVID emergency, being in a different place from The Network was not exactly unheard-of: salespeople on the road, and the awkward presence of business partners in a value chain that did not sit inside a Network.&nbsp; Still, configure a VPN and offer people the chance to get their emails on their phone should do the trick.&nbsp; Er no.&nbsp; A Network makes the mundane internal communication easy, the valuable inter-company connection really difficult.&nbsp; </p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">The point I am trying to make is that there are more risks to information than just penetration.&nbsp; If you put the word <span style="font-style:italic;">information</span> in front of the word <span style="font-style:italic;">security</span> you typically mean the challenge of preventing unauthorised access to that information: if you put the word <span style="font-style:italic;">energy</span> in front instead you are often talking about the challenge of maintaining supply.&nbsp; And it is this risk of non-supply of information that is the one suddenly confronting businesses as they realise that, for all their trumpeting about twenty-first digitisation, they are really no less dependent on the analogue infrastructure of the office than their nineteenth century counterparts, whizzing internal memos about through compressed air tubes.&nbsp; </p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">Ironically it is those businesses most obsessed with the first risk of penetration that have made themselves most vulnerable to the second: IT bods have obsessed themselves with the &quot;risk&quot; of putting stuff in the cloud.&nbsp; It is now obvious that it has been hugely risky not to.&nbsp; The risks of confidentiality in the cloud can be managed: the absence of a proper network (with a small n) of information outside the office cannot be fixed with the sticking plasters of a VPN and a hurried subscription to Zoom.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p><span style="color:inherit;"></span></p><p style="text-align:left;font-size:11pt;">When (I hope) things return to a more normal footing, and after thanking the IT department for their heroics in working all hours to apply emergency measures, perhaps a question or two needs to be addressed to the IT headshed as to why the business was so vulnerable in the first place to risks that were obvious (and mitigatable) way back in the SARS emergency of 2003.</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 09 Apr 2020 14:36:01 +0000</pubDate></item><item><title><![CDATA[Anti-Virus Software]]></title><link>https://www.supl.co.uk/blogs/post/anti-virus-software</link><description><![CDATA[It's a mixture of technology and culture]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Lw79FBhwQeKU9Lo02zgw-Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_3FAobpRCRVi6KhLPezKO6g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_OvzTKwMZQgyNWjuTMSK2bA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_OvzTKwMZQgyNWjuTMSK2bA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ExHQ7za9Reg4jQgl06sLug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ExHQ7za9Reg4jQgl06sLug"].zpelem-text{ border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:11pt;"><img src="/Karen%20-%20Simon%20-%20Websized-19.jpg" style="width:271.14px;height:151px;"><br></p><p style="font-size:11pt;"><br></p><p style="font-size:11pt;"><br></p><p style="font-size:11pt;">It is not surprising that we have had a number of enquiries from existing clients and prospects about Coronavirus, and how to prepare their systems for the various scenarios laid out by the UK Government yesterday.</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">It is first worth pointing out that we have been here before: the systems I built for Majedie, back in <span style="font-style:italic;">2003</span>, were at least in part designed with SARS in mind.&nbsp; It always struck me as odd that the Financial Regulator, even after the risks of human colocation were so amply demonstrated in that alarm, continued to insist on an &quot;Alternate Location&quot; as the lynchpin of any Disaster Recovery plan, something as useful as a trap door in a canoe in the event of a pandemic.&nbsp; Cloud software, in contrast, means an alternate location anywhere, or no location at all, depending on the risk.&nbsp; My suspicion is that they (and all the IT bods in the regulated businesses) were so focused on the mitigatable information security risks of the cloud that they ignored the fact that this left their businesses open to the catastrophic risk that they would not be able to operate at all.</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">The squawking noise we all hear is the sound of lots of chickens coming home to roost, as businesses scramble to get to where they should have been over a decade ago. Which brings us back to COVID-19: how do businesses prepare, how do they become scatter-proof?&nbsp; The answer, as with most things, is a mixture of technology and culture.</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">Many businesses will retort that they have been working hard at this for ages. Email is now available on phones, and VPNs deployed to tunnel into the Network to allow people access to their files. However, such piecemeal efforts are really designed to accommodate the odd straggler away from the office, not the entire team scattered to the four winds. The Network itself is vulnerable if no-one is physically inside it. What happens if the VPN gateway fails?&nbsp; How can clients phone the business if the telephones are behind the firewall, sitting proudly on empty desks?</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">Furthermore, such a Network was only ever there to support the real network, the physical interaction between colocated employees who printed stuff off, perched on desks to refine ideas and met to discuss progress. Left on its own, the Network is like a frame of steel girders, all structure but no colour or context.&nbsp; Faced with an absence of physical contact, employees struggle, even if the VPN is up (let's hope). A quick corporate credit card raid to buy a Zoom subscription isn't really going to help, as the means of communication is separate from the content. What happens when a fifth of your workforce is off sick? What was employee A doing when they were last working - are there any deliverables to finish?&nbsp; How do I find out the latest sales figures now that Maureen in Sales is no longer available on email to ask?</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">As we have said many times before, the answer lies in treating information as separate from the things it's manifested in - documents, departments, processes.&nbsp; Thus a sales report is defined by what it is, not who produces it. So what? The information is there, searchable, available and in context, to whoever needs it (and is accredited) regardless of where they are, or how they are organised. This latest Virus issue will pass, but we should not forget <span style="font-style:italic;">again</span> what it is telling us about our technology.</p><p style="font-size:11pt;">&nbsp;</p><p><span style="color:inherit;"></span></p><p style="font-size:11pt;">Which brings us on to the culture.&nbsp; For those businesses whose management have a Dickensian, untrusting outlook on their employees, this crisis is profoundly scary.&nbsp; They have no choice but to leave their employees to it, and if they have had no historical respect for their staff, you can bet the staff have similar levels of respect in return. No wonder Netflix shares are doing well.</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 04 Mar 2020 10:50:28 +0000</pubDate></item><item><title><![CDATA[Cyber - Improving the Company's Hygiene]]></title><link>https://www.supl.co.uk/blogs/post/cyber-improving-the-company-s-hygiene</link><description><![CDATA[We take a look at a current hot topic]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_mmCaCf17TlWN8HnQGZyBlg==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oqg6YmhWTtykhJXuKJEfUQ==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_d84zgV_7SbCsLyLqS2CtwQ==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Iuh1uJHrSka_7kFK_wvNEw==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:11pt;"><img src="/Karen%20-%20Simon%20-%20Websized-3.jpg" style="width:109px;height:164px;"><br></p><p style="font-size:11pt;"><br></p><p style="font-size:11pt;">There's been a lot of talk about cyber security recently, with the hack at British Airways and the constant refrain from the Government to company boards about their experience in this area.&nbsp; </p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">With more and more valuable interactions happening in the digital space, it follows that the impact of any cyber-whoops is therefore greater.&nbsp; But you've got to feel for the average board, recognising the rising risks in this area, understanding the need to engage, but struggling to know how to go about it.&nbsp; </p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">It's easy to get lost.&nbsp; &quot;Cyber&quot; (weird word, really) is an odd concept: at one level it is generally descriptive, defining the digital space as a whole.&nbsp; On the other, it is a narrow, threatening warning, often followed by an equally aggressive word like &quot;security&quot;, &quot;hacker&quot;, &quot;warfare&quot; etc. Think Arnie.&nbsp; Like so many technical terms, it has been coined by vendors hoping to define a space and sell into it.&nbsp; The medieval practice of selling indulgences involved blood curdling warnings of the dire consequences of not paying.&nbsp; Those consequences would play out in a dimension beyond human analysis, so there was no point in being rational.&nbsp; Just pay up.&nbsp; Sound familiar?&nbsp; For eternal damnation, read zero day exploit.</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">OK, a little harsh.&nbsp; How does a board become more able to take a rational view of this risk, as it does with other kinds of operational, market and financial risks?&nbsp; The problem, of course, is that the cyber piece is so new.&nbsp; With the explosion in connectivity (which is what the internet really represents) has come an attendant rush of value, and of risk.&nbsp; However, our culture has not had time to digest the risks it represents and specifically clock the behavioural catalysts to cyber trouble in the future.&nbsp; To a board, running a stretched balance sheet at the turn of the credit cycle is an obvious risk: as is running down the R&amp;D budget in an environment of tight market competition.&nbsp; Equally, that charity sword-swallowing session proposed by Kevin in Accounts would not be great for the firm's health and safety record.&nbsp; These are obvious catalysts to particular risks, because our culture is full of cautionary tales: Dickens writes colourfully on the risks of an over extended balance sheet (!) and presumably sword swallowing has, for some time, been viewed with caution.&nbsp; </p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">So how do we start to build this new consciousness? The secret, we think, is to break out of vendor-land and treat &quot;cyber&quot; as merely one facet of <span style="font-style:italic;">information management.&nbsp; </span>&quot;Information&quot; is the poor relation to its spoilt sibling, &quot;technology&quot;: when people talk of IT spend, they really mean T spend, where a tactical effort is made to organise the information simply as part of a project to install a system.&nbsp; It really should be the other way around: information is the most valuable resource in any company after its people, and a coherent plan for its management really ought to be the first thing companies do.&nbsp; Can we define our inputs? What are our key value-add processes?&nbsp; What are our outputs and who needs them?&nbsp; Notice not a system in sight at this stage.</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">Once this has been started, companies start to understand that information is different from the departments, systems, and documents that contain it, rather like energy is not the same as a piece of coal.&nbsp; Once that is understood, the company can start to organise around the management of that information, not the other way around.&nbsp; What do we mean by management?&nbsp; The development of a company-wide classification scheme (&quot;filing&quot; to you and me), the establishment of a single source for each item, and the efficient maintenance of the system of entitlement together with the matching of security environment with the sensitivity of the information: details of a customer's payment methods? Really sensitive.&nbsp; Details on the toilet cleaning roster?&nbsp; Not so much.&nbsp; In short, a plan to ensure the supply of reliable, consistent and discreet information to all those who need it, and <span style="font-style:italic;">only </span>those that do.</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">OK, so where does that relate to cyber?&nbsp; Well, a successful attack is just a symptom that you've got your information management wrong.&nbsp; Did a vengeful former employee retain access after their departure? Why did finance keep a copy of client records on &quot;their&quot; systems, away from all the GDPR controls on the CRM database? Why was a third party allowed to export a bundle of data to their systems, when they should have been permissioned on the company's own systems? Why was data needed by the client teams only available on an internal network, forcing those teams to carry paper and excel on the train?&nbsp; Why was the company dependent on bespoke software that ran on Windows 1875, preventing any patching?&nbsp; Why did an employee click on the attachment offering the usual accounts report, when they should have had independent access to those reports from a central system?</p><p style="font-size:11pt;">&nbsp;</p><p><span style="color:inherit;"></span></p><p style="font-size:11pt;">It's helpful to think of this in terms of hygiene.&nbsp; If you never wash your hands, leave your house dirty and not get enough sleep you'll probably need recourse to some fancy drugs from time to time.&nbsp; Attend to good habits, however, and the chances of catching something nasty are materially lower.&nbsp; It's those good habits in general that the board should focus on, not second-guessing the IT department with stuff read in the Daily Telegraph over the weekend.&nbsp; Focusing on those good habits will also highlight exceptions to these, developing a sense of the informational risks the company is running in the same way they do for other types of risks.</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 03 Oct 2018 12:44:18 +0000</pubDate></item><item><title><![CDATA[Politics and Penetration]]></title><link>https://www.supl.co.uk/blogs/post/politics-and-penetration</link><description><![CDATA[In a world where technology is not understood, there is a danger in thinking it's only about security.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_wH_w08AyTxGFX_MOGxQIHA==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_myAICkguSVicp5fhZoHBkA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5oOEmBEqTA6QYdlmJFhYfQ==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_GOfBx3jmS8S4vg7g1YDYZQ==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;font-size:11pt;"><img src="/Karen%20-%20Simon%20-%20Websized-3.jpg" style="width:110px;height:165.3px;"><br></p><p style="text-align:left;font-size:11pt;"><br></p><p style="text-align:left;font-size:11pt;">If your search engine has thrown this up in the pursuit of salacious stuff surrounding our dearly-beloved elected representatives, sadly I have to disappoint you.&nbsp; What I have to say concerns the rather more mundane world of IT systems.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">Still, it <span style="font-style:italic;">is</span> flippin' important.&nbsp; Given the lamentable levels of tech understanding among our politicians, if you say the word &quot;IT&quot; to them, they immediately think &quot;security/privacy&quot;.&nbsp; Now, I'm not saying that those things are not important, of course they are: but they are not the only things to be considered.&nbsp; The threats need to be balanced against the benefits of IT investment.&nbsp; Sadly, there are good reasons for things being as they are: politicians know little about tech, and so cannot enunciate much in the way of the &quot;why&quot;, save for some nebulous &quot;cost savings&quot; figure plucked out the ether by some obliging civil servant.&nbsp; Second, their constituents tend not to have much clue either, and are change averse: it's no surprise that this is front of mind for the politicians.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">Mind you, I malign politicians unfairly: a vanishingly small number of senior business people (including in the tech sector, interestingly) and senior public servants have any sense of the transformative potential of great technology either.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">So what? I hear you say.&nbsp; It's good to be cautious….Er, no, it's not.&nbsp; The consequences of such caution are that technology projects are judged <span style="font-style:italic;">exclusively</span> on their ability to withstand penetration, and on their progress on delivering against budget.&nbsp; Thus a system designed to be invulnerable can be pretty difficult to do anything in, spawning an explosion of the use of bootleg apps by users actually trying to get things done.&nbsp; And the best way to ensure a system delivers against budget is to inflate the budget, especially with all the paraphernalia designed to, you've guessed it, …..check on progress against budget.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;font-size:11pt;">So we have stuff built at multiples of their real cost, designed more for invulnerability than utility: no wonder IT has such a rubbish reputation.</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 19 Sep 2018 10:16:33 +0000</pubDate></item></channel></rss>