this post was submitted on 11 Sep 2023
626 points (98.5% liked)

Ask Lemmy

26690 readers
2147 users here now

A Fediverse community for open-ended, thought provoking questions

Please don't post about US Politics.


Rules: (interactive)


1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them


2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?


3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.


4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either [email protected] or [email protected]. NSFW comments should be restricted to posts tagged [NSFW].


5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email [email protected]. For other questions check our partnered communities list, or use the search function.


Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know

Reddit

Jokes

Ask Ouija


Logo design credit goes to: tubbadu


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 171 points 1 year ago* (last edited 1 year ago) (4 children)

I’ve worked with massive customer databases of over a million people multiple times in jobs I’ve had. And while each company has spent tens-of-thousands of dollars in cyber security to protect that data from outside hackers, none have given any fucks at all about who accessed it internally or what they do with it.

I’ve literally exported the entire customer database in two different jobs, dropped the CSV into my personal Google Drive (from my work computer), and worked entire databases at home.

No one has ever known I’ve done it, cared, or checked if I have any customer personal data when I quit.

[–] [email protected] 46 points 1 year ago (2 children)

Sounds like they didn't spend any money on Cyber security's team to properly implement it then....data exfil %100 would have been picked up by any real DLP solution and even barebones heuristics based EDR would have thrown a red flag as well.

[–] [email protected] 44 points 1 year ago (1 children)

Haha, please. You’re talking about machine learning when the best any business is using is antivirus. You forget, Boomers are still running big business and IT departments are running security.

It’s perfect world vs. real world my dude, and real world puts out tender for the cheapest solution.

[–] [email protected] 11 points 1 year ago (1 children)

It sounds like you've been working for Mom and pop shops then, and they're not having audits done. Companies with millions of customers will usually either have in house secops or an mssp handle everything. Point being is, without audits then insurance usually will not be approved for PII loss or they flat out will not work with the company at all. It even more so with HIPAA laws.

[–] [email protected] 1 points 6 months ago

I'm with the above commenter. I've worked at many companies of various sizes, from small local shops up to international corporations, including at least one contractor for the US military.

Every one of them had rules and policies and training on security, to varying degrees. But at every one of them, I'd find some vulnerability, or instance where someone was neglecting security. Each time, I'd bring it to the attention of someone in management. Each time (with one company as exception), those warnings would be "heard" and "passed up the chain", and then nothing would happen. Only one company in 20 years of work actually fixed a security issue I found. And no company I've ever worked for was leak proof.

In my experience, until it threatens to cost a company much more money in losses than it would cost to fix the problem, but said problem will not get fixed. That's profit motive. And often it seems they'd rather roll the dice until a loss occurs, and then (maybe) fix the issue.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

I've worked at plenty of companies with exfil protection and people still did this. One has 100 devs and 500 total employees

[–] [email protected] 36 points 1 year ago* (last edited 1 year ago) (1 children)

Sounds like the company doesn't have a clue about cyber security then. Tens of thousands is a piddling infosec budget for anything but a tiny company. Also, Insider threats, malicious or otherwise, should always be on an infosec professional's radar.

Companies not giving a shit about cyber security is probably not a secret but it is still pretty common, I think, so nobody should be surprised when there are major breaches.

Infosec is usually seen as an expense that cuts into profits. Assuming top level management and the board give a shit about security that's great but often the risk isn't fully appreciated at the top or is managed poorly.

Adequate infosec requires a company to have very mature processes across the board in IT (and likely beyond). C-level "buy in" isn't enough. If the C level management and board doesn't actively demand it, infosec will lose out to myriad other priorities every time.

The big tell is the org structure. If the CISO reports to the CEO, great. If they're reporting to the CIO, CFO, etc., that can cause conflicts of interest. It can still work. If there is no CISO or they are the same person as the CIO, or if infosec reports several levels down in the org--beware!

[–] [email protected] 12 points 1 year ago (1 children)

Yeah, if I did what he did, I'd be in jail. I would be caught quickly.

There are only a few ways to get immediately fired from my employer, and that's one of them.

[–] [email protected] 2 points 1 year ago

This exact scenario is in our annual training. Also I wouldn't be able to in the first place because we block those kinds of sites. Even if we didn't they would likely detect it and come a-knocking lol.

[–] [email protected] 18 points 1 year ago

That sounds highly illegal depending on what's on the databases.

[–] [email protected] 13 points 1 year ago

Lol same here. Some for ecomm, but the most egregious was underwriting PPP loans. There was a database none of us could access after the loans were underwritten and sent to processing. But most of those documents came in thru the portal and we had to download that package and combine it with anything we got in email... Tax forms, IDs, and all the most sensitive personal info as a lot of businesses that applied were sole proprietors. All those documents say on my local HDD and I catalogued them in case they were needed again.

None of that was handled securely, it was on my home network with no VPN, and after the project was over very suddenly I sat on that laptop for 6 months until they sent a return label. I was a good worker but it was a mass hire and not a lot of vetting that happened.