Top | |
Newsletter 12/1/2022 |
Back to Contents |
Facts From The Stats, or:
Timothy Leary's dead
As we witnessed with my client's BEC attack, there
is nothing theoretical about what should now be common knowledge
concerning the fundamentals of computer security. Yet, after all that
has happened over the last 20 years, like the abuse of psychedelic
drugs, what grew from a paradigm of new and ever expanding individual
freedoms, quickly devolved into a cesspool of individual obsessions and
an ever quickening path to one's own self-destruction. In both cases, mass adoption of complex
technology, pushed the pioneering professionals aside, as the hucksters
took over. Unpatched, out-of-date devices and software are a leading access point for cybercriminals. That’s why practicing good cyber hygiene is so important for avoiding destructive malware that can steal users’ personal information. Kind of sounds like something one might hear while in rehab, huh? One of the underlying principles of any Zero Trust implementation is that there is no boundary to the network, or as I prefer to state the notion in a bit more simple fashion, there is only one network and we all connect to that one network. So while the Department of Defense may put out its position paper concerning its Department wide imitative to implement Zero Trust across all DOD network installations, reality might well hamper those plans.
"Zero trust is a framework for moving beyond relying on
perimeter-based cybersecurity defense tools alone and basically assuming
that breach has occurred within our boundary and responding
accordingly," David McKeown, the department's acting chief information
officer, said... Currently, according to recent reports, 87% of DoD contractors do not meet the current security standards those doing business with DoD are required to meet right now. Models exist to measure compliance with DoD requirements, and any where near full compliance is no where on the horizon. If DoD compliance goals are to be met anytime within the time frame suggested, then a sea change in attitude concerning best practices must begin and soon. If you’re in the market of providing support to the Department of Defense, the market conditions have changed because the department is essentially saying, ‘If you want to do business with us, we need to be able to trust that you are valuing our data as much as we do, and therefore protecting it to the standard that we need to protect it. At one time, "Built to Military Specifications" meant the pinnacle of precision manufacturing. Military hardware must work in the field; so built to "mil- spec" meant "our stuff works." Yet, if the principles of Zero Trust are realized to their logical end, all of this Sturm und Drang on the part of one government agency to impose security standards on one group of Internet users, while a vast number of the rest of the bunch go unwashed and unpatched, will soon become unsustainable. If one part of the military device is built to spec, but another component is built to the low standards of the lowest bidder, to the soldier whose weapon has just failed in the field this is a distinction without a difference. When a specification is not met, the entire effort will most likely fail.
If the principles of Zero Trust are to be more than a marketing slogan,
and in fact an expression of reality, then all computers are always at
risk by what a random sampling of Statistics of Visitors to my two websites show.
Fact is
8%, or 3 out of 36, or 8 out of 100, computer users are still using
versions of Windows long out of date. Really, I
am surprised that a machine running Windows XP could even connect to a
modern network. But here you are. PULEEZEE!!! If
your computer is running Windows 7 or Windows 8.1, click
here to download and install the Windows 10 Update
Assistant. When Update Assistant loads, click Update This Machine.
If you have a legitimate installation of Windows 7 or Windows 8.1, as of
September 2022, Microsoft still offers these older Operating Systems a
free upgrade to Windows 10. If your machine runs Win 7 or 8.1 problem free, my
experience is that it will most likely run Windows 10 just fine, too.
The Apple OS,
macOS 10.15, Catalina reached its end of life November 2022.
And that XP machine... at least replace that
Ford Edsel with an up to date
inexpensive ChromeBook.
Essentially, there's a universe inside your brain. The number of connections possible inside your brain is limitless. And as people have learned to have more managerial and direct creative access to their brains, they have also developed matrices or networks of people that communicate electronically. There are direct brain/computer link-ups. You can just jack yourself in and pilot your brain around in cyberspace-electronic space. ― Timothy Leary, Chaos & Cyber Culture, 1994 Ronin Publishing (CA)
Also see, "PERSONAL
COMPUTERS/ PERSONAL FREEDOM," by Timothy Leary,
The
Digital Deli, 1984
The David Scheff Interview, Roliing Stone. |
Gerald Reiff |
Back to Top | ← previous post | next post → |