Archived version: https://archive.ph/vmEpv
Archived version: https://web.archive.org/web/20231224092642/https://www.fastcompany.com/91002831/us-water-utilities-hacked-cybersecurity
I’m too drunk to read the whole thing, but I have an anecdote that is related.
Years and years ago one of my customers was a city. They had SCADA systems to control and monitor the city water. Originally there was no way to access the Internet from the control machines and no way to access those machines from the Internet.
Well, they got a new boss at the water department and he wants to check it from home. He’d been told that’s a bad idea repeatedly. Eventually my boss got some folks at the city to sign a document saying we don’t recommend it and they accept the risks and I get him remote access.
Time moves on several months and suddenly half the city has no water. Anyone care to guess why? Anyone care to guess who the city tried to blame? Because that person and the MSP they worked for would have been fucked if not for a nice waiver showing that we said this would happen.
I so hope that person got successfully sued.
Nope. No consequences at all. He was around for a while after that, same position. A quick glance at LinkedIn shows he owns/runs a hotdog joint now. That’s not something I would have guessed.
For all the measures companies take to secure everything from unauthorized access via breaches in security, there is *NO * greater threat to their system than the intended end-user.
Who can be dumb, lazy, complacent, or simply doesn’t give a shit. Usually those last two in my experience.
I’ve seen a setup that requires multiple pass codes and keys to get from any door to the server room, with reminders that personal devices are NEVER to be used with anything inside all along the way, and some chucklefuck sticks a flash drive with his music in the only pc in the room “so I can jam while I work, you know how it is, nobody will know”
My experience is: If you don’t want x to happen with computer systems, make it physically impossible. Cut the internal USB cables or super glue them shut.
I actually have worked in places where the company straight up took a screwdriver and physically broke every single usb port.
Also had to use a non-networked laptop where all the i/o ports were hot glued to keep whoever works on it from putting anything on it, since it was for a specific purpose.
That’s not even “hacked”, that is just “criminals got in because we left the front door open”
welp time to change my password to 2222
9999 would take longer to brute force.
The article doesn’t explicitly go into it, but I get the impression this could be greatly improved by making those utilities public instead of private and requiring certain standards rather than encouraging them.
I read the post backwards, somehow, in spite of reading it twice. Oops.
~~Yes, because that’s worked so far for the train wreck that is the US healthcare industry or the Texas energy grid.
There are a lot of things to improve, sure, but turning it over to private industry is not the right one.~~
You may want to reread what I said.
Sorry about that. I read it twice and still somehow misread. Thanks for pointing it out.,
“You know, as much as I’d like to claim this was the result of me being a genius, it’s more that someone else was not. “
Freeman’s Mind
every month or so i get reminded of how many telco customers here have default passwords for their pppoe authentication (for dsl) and email accounts. it’s scary.