- Top 10 Recession-Proof IT Jobs
- 7 Hot IT Jobs That Will Land You a Higher Salary
- Link Building Strategies and Tips for 2014
- Top 10 Accessories for Your iPad Air
Network World - The unfolding cliffhanger in San Francisco this week – in which a city network administrator has been arrested for allegedly holding the network hostage – represents an extreme example of the insider threat that IT security vendors and others have been sounding the alarm about for years.
City prosecutors and San Francisco Mayor Gavin Newsom were still seeking to resolve the crisis by having experts try to take back the city's compromised network from 43-year-old Terry Childs, who was arrested when he refused to relinquish network control.
There's worry that Childs, who has worked for the city for five years but faced firing for alleged poor performance, may have installed the means to electronically destroy sensitive documents. Childs, being held in a jail cell on $5 million bond, also happens to be a former felon convicted of aggravated robbery and burglary stemming from charges over two decades ago, which the city knew when it hired him as a city computer engineer.
He has pled not guilty to four counts of computer tampering, accused of creating a single password and denying any other administrator access to the city's network. His lawyer in the ongoing negotiations says Childs is "willing to cooperate."
"So far he's not willing to give the passwords out and we're still trying to regain access," says Ron Vinson, chief administrative officer for the city's Department of Technology, who says Childs was part of the team that designed the city's network that has taken shape over the past four years. He adds that city workers currently do have normal access to records.
The insider threat is typically described as including disgruntled and unscrupulous employees trying to gain access to information they shouldn’t, and sharing it for personal gain, espionage or revenge. Finding countermeasures now looms large in the plans of many companies—especially ones that have been hit. (Compare Data Leak Protection products.)
“A year ago we suffered some breaches,” says Steve Farrow, managing director for the U.K.-based operations of Pilz, the Ostfildern, Germany-based manufacturer of industrial safety machinery. “We suffered a physical break-in where someone stole hard disks in order to steal computer data, not taking the whole machine. They targeted intellectual property linked to development plans. It wasn’t encrypted.”
Farrow thinks an insider is probably the culprit, though no one was caught despite police effort. In another case around the same time, says Farrow, an employee went to work for a competitor, handing the new employer plenty of electronic data about financial reports and product-launch dates. The combination of those two events spurred Pilz to undertake new defenses in data protection by rolling out document-control software for security.
The software from Liquid Machines for enterprise-rights management establishes read, write and print controls on sensitive research and business information, while storing it encrypted. “Everyone in the company who has a computer is getting this,” says Farrow, noting this means about 1,300 people. He adds that physical security has also been tightened after what was seen as an emergency at the firm.