
How Long...
Until he declares himself Emperor Trump, in the interests of keeping the American people safe of course. For examples, see Napoleon and Palpatine.
35 publicly visible posts • joined 15 Mar 2013
Simple answer? Because it would cost money to maintain that list and create/update rules, whereas setting parameters once is cheap and easy. There are many, many variables to be considered when it comes to security but poor security almost always boils down to stupidity and/or cost.
In 'The Legacy of Reginald Perrin' a few years ago, the heirs to his estate had to come up with a really silly idea, so someone proposed the young age pension. When people leave education, they get paid to do nothing for 10 years except bum around, explore the world, have parties, get drunk etc. They get it out of their system, enjoy themselves while they are young enough to do so, then after 10 years they get a job and work until they die.
It was rejected for being far too sensible.
The internet of things terrifies me, and not just because of Skynet. As always, developers are being asked to rush things out there and security doesn't even get invited in for the ride, never mind take a back seat. Nest? Looks very nice, owned by Google. Hive looks promising but needs its own router and their privacy policy states:
"We can use any of our information to contact you. We can contact you by post, email, phone, text message or any other kind of electronic communication (such as through your smart meter if you have one). We can also visit you."
Sounds more like a threat to me.
What you need to remember about audits is that they are ultimately checking to see if you are operating in the way you said you would - in line with company policy, agreed standards etc. So if you're not, don't try to hide it, try to get the policies and procedures changed. And please also remember that auditors start off all fresh-faced and well-meaning, but years of dealing with grouchy IT boffins who think that the rules don't apply to them takes its toll.
The most obvious problem with the use of pigeons is surely The Vulture Squadron - although to be fair I can't think of a time when they actually stopped the pigeon. The mastermind was a shady, never-seen character called the General though, so maybe Hanna-Barbera were on to something.
You've heard about the man hiring a new PA, requirement = speaks 3 languages and can do 100 words per minute. He ends up with a shortlist of 3 - a brunette who speaks 3 languages but can only manage 80 words per minute, a redhead who speaks 2 languages but can do 90 words per minute, and a blonde who only speaks one language but can do 100 words per minute. Who gets the job?
The one with the biggest boobs of course.
In that a one-size fits all, tick-box compliance exercise does not mean that the risks have been managed or even identified. But some (most?) organisations possess neither the capability nor the will to fund a fully reactive, risk-based information security function. So until such time as the new EU breach/attack-sharing bears fruit and senior management actually see what is happening, it's policies, standards and checklists all round.