<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.supl.co.uk/blogs/tag/cyber/feed" rel="self" type="application/rss+xml"/><title>Supl - Thoughts #cyber</title><description>Supl - Thoughts #cyber</description><link>https://www.supl.co.uk/blogs/tag/cyber</link><lastBuildDate>Thu, 03 Apr 2025 20:38:40 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Vertical v Horizontal]]></title><link>https://www.supl.co.uk/blogs/post/Vertical</link><description><![CDATA[Technology is not just for nerds]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_iR6hbecaQZ6fnL3M0MQ5YQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_FNH3RM4DTjWTeW51AJvxAg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_x_Lwr4wsS3yj5raZSXD01A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dKT3R8lvS_G3acJBQ5qwkw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dKT3R8lvS_G3acJBQ5qwkw"].zpelem-text{ border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;font-size:11pt;"><img src="/Karen%20-%20Simon%20-%20Websized-3.jpg" style="width:98px;height:147.5px;"><br></p><p style="text-align:left;font-size:11pt;"><br></p><p style="text-align:left;font-size:11pt;"><span style="font-size:11pt;">Looking at the world in the early 21st Century, it's possible to see things in two different ways: on the one hand, you have the vertically-delineated world of nations.&nbsp; Indeed, many of the recent developments in politics can be seen as the reinforcement of the age-old relevance of the nation-state - Brexit, Trump, Chinese sabre-rattling etc.&nbsp; On the other hand, however, there are plenty of things that seem to work horizontally, cutting across national boundaries: environmental measures, pandemics, financial markets and technology.</span><br></p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">The issue comes when you try to square the vertical with the horizontal.&nbsp; And it's an issue that gets ever bigger, as the horizontal forces grow stronger.&nbsp; I wrote in an earlier blog about the risks that populism pose for the cloud architecture, depending as it does on borderless access.&nbsp; The risk flows the other way too, as the supranational challenges of the environment, financial stability, the pandemic and the internet could render a national government superfluous, save for the assiduous execution of multilateral accords.&nbsp; Wriggle as it might, the UK government's efforts to &quot;take back control&quot; have simply highlighted how little room for manoeuvre there is to plough its own furrow - its trade, welfare, and fiscal policies all look remarkably similar to its neighbours'.&nbsp; The danger is that governments try to camouflage their limited power by popinjay politics, picking fights with those aspects of the multilateral norms that suit domestic opinion polls.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">It is interesting that, as horizontal influences strengthen, so do our powers of denial.&nbsp; I have written before about the extraordinary sniffiness many in the UK have towards technology and numbers:&nbsp; it's a badge of honour to be pap with machines.&nbsp; We also call this horizontal march &quot;globalisation&quot;, as if conveniently to label it as a conscious (and deliciously reversible) policy.&nbsp; Our talking shop parliaments, filled with talkers, wish for a world controllable by talk.&nbsp; Sadly, the logic of global capital markets and technology do not listen to talk, and certainly not national talk.&nbsp; Much as we would like to define our own versions of these things, it is doomed and as parochial as those in English regions and cities who fought to keep local time in the face of the march of the railways in the Nineteenth century.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">How are the horizontal influences strengthening?&nbsp; In addition to culture, the existence of the nation state owed much to its necessity: To do some<span style="font-style:italic;">thing</span>, you needed to be some<span style="font-style:italic;">where.&nbsp; </span>That is rapidly becoming unnecessary.&nbsp; Even internet access, hitherto dependent on local infrastructure (and so local control) will increasingly be available anywhere you can see the sky, which is frightening the heebiegeebies out of the Russian and the Chinese governments.&nbsp; Travelling?&nbsp; The infrastructure needed to do so internationally inevitably invokes a border trigger (bar the odd smuggler).&nbsp; What happens when a VTOL drone can move you 300 miles? Ordinary (if wealthy) people can then make their travel arrangements free of government purview, in the same way as the advent of the eurobond market created &quot;moneyland&quot; for people's financial arrangements.&nbsp; My point is not that these developments are good or bad (and, in the case of money, it has definitely caused issues), but that they will come, and will necessitate a reaction better than denial.&nbsp; </p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">How do hyper-vertical organisations react?&nbsp; The history of national tax agencies in the teeth of moneyland shows how hard it can be.&nbsp; Even the Americans now see the benefits of international cooperation on tax, which perhaps shows the way for other agencies.&nbsp; The UK's first attempt at carbon pricing will mean nothing until it builds the links to the European equivalent, for instance.&nbsp; Perhaps the most interesting challenge lies with those vertical institutions whose role is at least in part, the opposite of cooperation: national armed forces.&nbsp; Possessing an ancient hammer, there is a danger that everything continues to look like a nail - cyberspace becomes just another vector of battle, they might say.&nbsp; Except that it isn't: warfare in this space is like a competition to chuck the most powerful brew down a communal well - everyone ends up poisoned.&nbsp; Almost all the most damaging cyber incidents that we know about that have affected the West - Notpetya, Wannacry - contained major elements actually first built by Western Cyber Agencies.&nbsp; They are on the horns of a particularly difficult dilemma.&nbsp; They are paid to be the State's ultimate insurance, standing up to threats and possessing the nation's monopoly of violence.&nbsp; In that context, they are pushing back against authoritarian regimes like Russia and China.&nbsp; But in so doing, they unwittingly become those nations' accomplices in the strengthening of national boundaries that cut across the global technology commons, a commons profoundly dangerous to authoritarianism.&nbsp; And in so doing, they might find themselves more at home with their adversaries' social and patriotic values than those of the people they are paid to defend.</p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;font-size:11pt;">&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 17 May 2021 15:51:17 +0000</pubDate></item><item><title><![CDATA[The Huawei Problem]]></title><link>https://www.supl.co.uk/blogs/post/the-huawei-problem</link><description><![CDATA[It's not the company, it's our approach....]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_FcupDMHpRTidcicoC5PvHA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_b8PAHQOcS2mimPz6_gYxog" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BNfzvw-QT8qlnq1uTLvmMQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ao8mhfqDRPWy-uHcveernw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ao8mhfqDRPWy-uHcveernw"].zpelem-text{ border-style:none; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:inherit;"></span></p><div><div style="width:7.6041in;"><div style="width:7.6041in;"><p style="text-align:left;font-size:11pt;"><img src="/Karen%20-%20Simon%20-%20Websized-3.jpg" style="width:103px;height:154.5px;"><br></p><p style="text-align:left;font-size:11pt;"><br></p><p style="text-align:left;font-size:11pt;">Despite the title of this piece, the problem isn't actually really Huawei: it's how we are approaching this issue.&nbsp; </p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">What's the issue? Technology meets sovereignty, or perhaps the Twenty-First Century meets the Twentieth.&nbsp; There is a fundamental disconnect between what global technology represents - a horizontal, global reality, and what a country does - a vertical, local reality.&nbsp; And whilst we might think it's only technology that is causing this horizontal/vertical farrago, it's not: the same is present in financial markets and the environment.&nbsp; Despite what some nationalists might wish, we all live in the same pond, and the ripples from a pebble chucked into the middle will affect all.&nbsp; To illustrate the point, think of three rather delightful pebbles thrown into the global pond by Russia over the past 40 years.&nbsp; The Chernobyl accident sent plumes of contamination into Scandinavia, the debt default of 1998 almost destroyed US financial markets, and its gentle export of the NotPetya virus into Ukraine forced Maersk, the global shipping company, back into the stone age to continue operating, also causing $10bn of damage in the wider global economy.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">So, back to Huawei.&nbsp; The knee jerk reaction is to think of it in terms of &quot;us&quot; and &quot;them&quot;, &quot;here&quot; and &quot;there&quot;.&nbsp; Huawei, so the script goes, is in hock to its government, so &quot;letting them in&quot; risks a concerted effort at government espionage, shout the Americans.&nbsp; Well, they would know.&nbsp; Whilst have no doubt that Huawei is indeed a risk for the reasons identified by the Americans (and others), it is simply the wrong way to look at all of this.&nbsp; There is no &quot;us&quot; and &quot;them, &quot;here&quot; and &quot;there&quot; in technology: in the words of one senior tech exec, &quot;we all use the same sh*t&quot;.&nbsp; Whilst there is a risk of a Huawei backdoor, so there is at Cisco.&nbsp; Buying &quot;western&quot; stuff may sound a good plan until you realise it's all assembled in China.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">Where am I going with this, given that it's meant to be a blog to help companies with their IT?&nbsp; Well, the Huawei problem is a high profile example of the dangers of the perimeter illusion: that somehow you are &quot;in&quot; and others are &quot;out&quot;.&nbsp; First, it is simply not how the world works.&nbsp; A company network cannot be impermeable, because if it was, it would be useless.&nbsp; Holes have to be opened up to receive stuff from &quot;outside&quot;.&nbsp; Companies have spent gazillions on fancy vendor products to police the holes, which is good for the vendors, but will never fix anything properly (which of course is also good for the vendors).&nbsp; The second pernicious consequence of the perimeter illusion is that we falsely mistrust too much from the &quot;outside&quot; and wrongly trust too much on the &quot;inside&quot;.&nbsp; Too much mistrust in the outside is bad for business, and too much trust on the inside is disastrous.&nbsp; To take a non-tech example of this, just look at Guy Burgess, the Russian spy in the heart of the British Establishment.&nbsp; He was allowed to get away with it as people felt he was one of &quot;us&quot;.&nbsp; To bring it back to tech and to Maersk, NotPetya was so devastating as the computing environment inside the network pre-supposed trust among the machines, facilitating the flow of the virus (delivered using a mechanism designed by the Americans, ironically).&nbsp; </p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">This is not to criticise Maersk particularly: whilst they could have been better at upgrading their PCs, their network architecture reflected the same fundamental illusion as almost everyone else: that there is a &quot;here&quot; and &quot;there&quot; in technology, and you base your trust judgement on whether they are one or the other.&nbsp; So, what is the advice?&nbsp; For this we need to go back to another horizontal horse of the apocalypse, pestilence.&nbsp; We have long understood that whilst quarantine and other physical measures can help, the best defence against infection is good personal habits wherever you are - hygiene, diet and inoculation.&nbsp; To take that back into the tech space, do not base your precautions on &quot;where&quot; you are, but navigate by a simple set of standard rules: keep operating systems up to date, connect not to other machines but to independent cloud-based apps and manage your credentials carefully, avoiding duplicate passwords and your mother's maiden name.</p><p style="text-align:left;font-size:11pt;">&nbsp;</p><p style="text-align:left;font-size:11pt;">The &quot;Huawei Problem&quot; is not the vendor, but the way we look at technology.&nbsp; Huawei is not &quot;them&quot; whilst, say, Ericsson, is &quot;us&quot;.&nbsp; Network kit should be managed and monitored, wherever it's &quot;from&quot;.</p></div>
</div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 03 May 2019 14:05:34 +0000</pubDate></item><item><title><![CDATA[Cyber - Improving the Company's Hygiene]]></title><link>https://www.supl.co.uk/blogs/post/cyber-improving-the-company-s-hygiene</link><description><![CDATA[We take a look at a current hot topic]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_mmCaCf17TlWN8HnQGZyBlg==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oqg6YmhWTtykhJXuKJEfUQ==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_d84zgV_7SbCsLyLqS2CtwQ==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Iuh1uJHrSka_7kFK_wvNEw==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:11pt;"><img src="/Karen%20-%20Simon%20-%20Websized-3.jpg" style="width:109px;height:164px;"><br></p><p style="font-size:11pt;"><br></p><p style="font-size:11pt;">There's been a lot of talk about cyber security recently, with the hack at British Airways and the constant refrain from the Government to company boards about their experience in this area.&nbsp; </p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">With more and more valuable interactions happening in the digital space, it follows that the impact of any cyber-whoops is therefore greater.&nbsp; But you've got to feel for the average board, recognising the rising risks in this area, understanding the need to engage, but struggling to know how to go about it.&nbsp; </p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">It's easy to get lost.&nbsp; &quot;Cyber&quot; (weird word, really) is an odd concept: at one level it is generally descriptive, defining the digital space as a whole.&nbsp; On the other, it is a narrow, threatening warning, often followed by an equally aggressive word like &quot;security&quot;, &quot;hacker&quot;, &quot;warfare&quot; etc. Think Arnie.&nbsp; Like so many technical terms, it has been coined by vendors hoping to define a space and sell into it.&nbsp; The medieval practice of selling indulgences involved blood curdling warnings of the dire consequences of not paying.&nbsp; Those consequences would play out in a dimension beyond human analysis, so there was no point in being rational.&nbsp; Just pay up.&nbsp; Sound familiar?&nbsp; For eternal damnation, read zero day exploit.</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">OK, a little harsh.&nbsp; How does a board become more able to take a rational view of this risk, as it does with other kinds of operational, market and financial risks?&nbsp; The problem, of course, is that the cyber piece is so new.&nbsp; With the explosion in connectivity (which is what the internet really represents) has come an attendant rush of value, and of risk.&nbsp; However, our culture has not had time to digest the risks it represents and specifically clock the behavioural catalysts to cyber trouble in the future.&nbsp; To a board, running a stretched balance sheet at the turn of the credit cycle is an obvious risk: as is running down the R&amp;D budget in an environment of tight market competition.&nbsp; Equally, that charity sword-swallowing session proposed by Kevin in Accounts would not be great for the firm's health and safety record.&nbsp; These are obvious catalysts to particular risks, because our culture is full of cautionary tales: Dickens writes colourfully on the risks of an over extended balance sheet (!) and presumably sword swallowing has, for some time, been viewed with caution.&nbsp; </p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">So how do we start to build this new consciousness? The secret, we think, is to break out of vendor-land and treat &quot;cyber&quot; as merely one facet of <span style="font-style:italic;">information management.&nbsp; </span>&quot;Information&quot; is the poor relation to its spoilt sibling, &quot;technology&quot;: when people talk of IT spend, they really mean T spend, where a tactical effort is made to organise the information simply as part of a project to install a system.&nbsp; It really should be the other way around: information is the most valuable resource in any company after its people, and a coherent plan for its management really ought to be the first thing companies do.&nbsp; Can we define our inputs? What are our key value-add processes?&nbsp; What are our outputs and who needs them?&nbsp; Notice not a system in sight at this stage.</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">Once this has been started, companies start to understand that information is different from the departments, systems, and documents that contain it, rather like energy is not the same as a piece of coal.&nbsp; Once that is understood, the company can start to organise around the management of that information, not the other way around.&nbsp; What do we mean by management?&nbsp; The development of a company-wide classification scheme (&quot;filing&quot; to you and me), the establishment of a single source for each item, and the efficient maintenance of the system of entitlement together with the matching of security environment with the sensitivity of the information: details of a customer's payment methods? Really sensitive.&nbsp; Details on the toilet cleaning roster?&nbsp; Not so much.&nbsp; In short, a plan to ensure the supply of reliable, consistent and discreet information to all those who need it, and <span style="font-style:italic;">only </span>those that do.</p><p style="font-size:11pt;">&nbsp;</p><p style="font-size:11pt;">OK, so where does that relate to cyber?&nbsp; Well, a successful attack is just a symptom that you've got your information management wrong.&nbsp; Did a vengeful former employee retain access after their departure? Why did finance keep a copy of client records on &quot;their&quot; systems, away from all the GDPR controls on the CRM database? Why was a third party allowed to export a bundle of data to their systems, when they should have been permissioned on the company's own systems? Why was data needed by the client teams only available on an internal network, forcing those teams to carry paper and excel on the train?&nbsp; Why was the company dependent on bespoke software that ran on Windows 1875, preventing any patching?&nbsp; Why did an employee click on the attachment offering the usual accounts report, when they should have had independent access to those reports from a central system?</p><p style="font-size:11pt;">&nbsp;</p><p><span style="color:inherit;"></span></p><p style="font-size:11pt;">It's helpful to think of this in terms of hygiene.&nbsp; If you never wash your hands, leave your house dirty and not get enough sleep you'll probably need recourse to some fancy drugs from time to time.&nbsp; Attend to good habits, however, and the chances of catching something nasty are materially lower.&nbsp; It's those good habits in general that the board should focus on, not second-guessing the IT department with stuff read in the Daily Telegraph over the weekend.&nbsp; Focusing on those good habits will also highlight exceptions to these, developing a sense of the informational risks the company is running in the same way they do for other types of risks.</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 03 Oct 2018 12:44:18 +0000</pubDate></item></channel></rss>