I just posted an article at Toolbox.com about the business risks associated with shadow IT. Many organizations see shadow IT as a disease to be cured. However, as I write in my post, shadow IT is a symptom of a deeper issue. It is this issue, related to IT remaining stuck in the past, that must be addressed.
Archive for the ‘Business Continuity’ Category
Shadow IT: Treat the cause, not the symptom
In Application Security, Business Continuity, Cloud Computing, Critical Infrastructure on July 8, 2015 at 04:00MIT Report Troubling
In Business Continuity, China, Cyber-warfare, Government, Risk Management on March 1, 2013 at 18:17In a recent report (MIT Report: U.S. Manufacturing Hits a Wall When It’s Time to Scale), Curt Woodward writes that a group of MIT researchers discovered an almost impassable chasm when looking for investment dollars. The investment dollars were for needed for 150 production companies wanting to move to full-scale production, and they were only available from foreign investors or if moved off-shore.
Why is this a security issue? Because it has been clear for a long time that no one wants to build manufacturing plants in the US. I’m not talking about steel mills; rather, the 150 companies (many started or supported by MIT students, professors, etc.) focused primarily on hi-tech products. Just what we need… move all hi-tech production–the kind of production that is crucial to our economy and our national security–off-shore or make it vulnerable to the whims of foreign investors.
I don’t care whose fault this is; we spend far too much time in this country pointing fingers when we should be sitting down together to solve problems. China is laughing is collective butt off as it steals our intellectual property and increasing builds our technology. I just don’t think it’s that funny…
Nyuh-uh… wasn’t me…
In Business Continuity, China, Computers and Internet, Critical Infrastructure, Cyber Espionage, Cyber-warfare on February 20, 2013 at 18:48Read this article first. Unit In China’s PLA Behind Massive Cyber Espionage Operation: Report | SecurityWeek.Com.
Now we can talk…
It should come as no surprise that China is aggressively hacking into anything it can. In 2009, Gurmeet Kanwal wrote in the Journal for Defence Studies,
“The Chinese call their pursuit of information warfare and other hi-tech means to counter Washington’s overwhelmingly superior conventional military capabilities “acupuncture warfare”, a term that first surfaced in a 1997 PLA National Defense University publication entitled “On commanding Warfighting under High-Tech Conditions.” Acupuncture warfare (also called “paralysis warfare”) was described as ‘Paralysing the enemy by attacking the weak link of his command, control, communications and information as if hitting his acupuncture point in kung fu combat.'”
So the Chinese have hacked, wheedled, and otherwise slunk into our national infrastructure. They seem to be expanding on their initial acupuncture approach with theft of information needed to catch up with or impede Western technical and financial progress. Of course, the Chinese deny they are anything but victims.
Yes, it is naive to believe we aren’t just as aggressively going after the Chinese. However, public and private organizations still fail to understand the threat. In China, the government has no problem applying pressure where needed to protect national infrastructure. In fact, it is highly probable the Chinese government can disconnect China from the Internet on command. In both areas, Western nations are at risk.
The path we must take in the West is to force government, financial institutions, utilities, healthcare organizations, and other critical service providers to secure their networks or face severe sanctions. After all, we can do little about what China sees as behavior in support of its national security. What we can do is remove the vulnerabilities it exploits and closely monitor for what is obviously continuous malicious activity. We’ve waited long enough for government and private management to do the right thing. It’s now time to pick up Teddy’s big stick and domestically whack some heads.