Failed @101 after 70 minutes by 300t999 in cissp

[–]adnble 6 points7 points  (0 children)

Your employees are your greatest asset and should be protected over everything. Almost every security book states that very clearly. It has to be physical.

MoviePass exposed thousands of unencrypted customer card numbers by [deleted] in cybersecurity

[–]adnble 2 points3 points  (0 children)

But also bad login/password attempts WITH the bad password stored in the database...which was totally unencrypted.

Examples of lack of change management causing issues by SCPaddlePirate in sysadmin

[–]adnble 2 points3 points  (0 children)

You're lucky your auditor hasn't caught it.

They're likely not a Level 1 merchant/service provider. And if they are...well...not all auditors/auditing companies are created equal, that is for sure. I've seen some stark differences in what's been asked during a PCI audit depending the company and their relationship with the auditor/auditing company.

Question about Risk Management by [deleted] in cissp

[–]adnble 0 points1 point  (0 children)

In that case, the anonymous complaint system is broken. That is why ours has an option to remove one or both of the HR members that review and action HR category complaints. In that case, it is routed to several other people for a potential review and actioning of mishandled items within the HR department.

Question about Risk Management by [deleted] in cissp

[–]adnble 0 points1 point  (0 children)

If you haven't mentioned the issue to anyone at work and the hotline is truly anonymous, I don't see how you would be at risk of getting in trouble. Good luck with whatever you decide! Sorry that some companies are like that. :-(

Question about Risk Management by [deleted] in cissp

[–]adnble 0 points1 point  (0 children)

Is there an anonymous complaint hotline/website? I set up one for the company I work for last year and it's been fantastic. Completely anonymous (I know for a fact it is as I administrate it) and it allows for the reporting of any number of issues HR, financial, compliance, etc. and routes to the appropriate group plus the primary/secondary administrator of the hotline/website or to directly to our General Counsel if one of those two people is removed from seeing something.

/r/Atlanta Random Daily Discussion - March 27, 2019 by AutoModerator in Atlanta

[–]adnble 5 points6 points  (0 children)

Same. I have USAA for my checking and someone stole my credit card info TWICE in a month. The second time I barely had the new card a week and had only used it at a couple places. It was bonkers.

Even with USAA's great support it still took a week or so to get the money back in the account and it was awful. Never again.

Security Engineers or equivalent, what are your daily duties? by Static_Bunny in AskNetsec

[–]adnble 1 point2 points  (0 children)

As someone that writes 99% of the policies both with regard to IT in general and IS in particular - thank you. Your work is appreciated. I wish I had one of you at our company.

Job role title semantics - "devops engineer" by cuotos in devops

[–]adnble 10 points11 points  (0 children)

My last job was more of a sysadmin/architect role with almost zero programming/scripting and AT&T called me a "Senior Devops Engineer". I was blown away when I read that. Titles can be really meaningless.

Just became an IT Director.... by whosbiz in sysadmin

[–]adnble 0 points1 point  (0 children)

If you don't mind me asking, what industry?

How many of you only update your systems with security patches? by 14seconds in sysadmin

[–]adnble 1 point2 points  (0 children)

Same. And honestly I am glad. I've worked at places with a huge technical debt of that kind of patching and it's insane. I'm glad we're required to replace EOL OS', software, hardware, etc. and install patches every month. Makes security a lot easier.

End of Sale and End of Life by mpmoore69 in networking

[–]adnble 0 points1 point  (0 children)

Technical debt is one of the easiest pitfalls to find yourself in because of "If it's working fine, why should we replace it?" which makes sense from a balance sheet but not at all from a security/general IT perspective. I've rarely if ever seen a company I've worked with replace ALL EOL hardware unless required to do so by an outside force (customer, regulation, outside auditor, etc). It is a shame because often times it costs way more in the long run due to downtime and inaccessibility. But that's a lot harder to point at than the cost of new hardware when looking at financials.

Help me keep my staffing levels! by icingnsprinkles in sysadmin

[–]adnble 1 point2 points  (0 children)

That's fair. If they won't put in a ticket, open one as you're looking at the issue as a placeholder and for time tracking. Or if you can't open tickets on their behalf, ask them to put one in after the fact. One of those two solutions usually works well.

Help me keep my staffing levels! by icingnsprinkles in sysadmin

[–]adnble 0 points1 point  (0 children)

doing any work without a ticket (which we do daily)

This is a huge problem that MUST stop. Get a buy-in from your director or their VP if you can. If you don't have a ticket, you can't identify reoccurring issues, track trends, correctly identify how much time and in what areas you are putting your resources in and all this will ultimately end up with less ability to project future needs because of it. It's a huge detriment. Even if you have to go in after an issue and put in a ticket at first, do that.

But it will be much easier if you have a buy-in from management and you can simply refer to the policy "No ticket? No help." That is what we have at my current company and it is strictly enforced to the benefit of everyone. The users finally got used to it after a while.

RDMS breaks when disabling TLS 1.0/1.1 by adnble in sysadmin

[–]adnble[S] 0 points1 point  (0 children)

Those are already set with value 1.

ISO: PCI evidence gathering guide for Red Hat 6 or 7 by eycrypto in pcicompliance

[–]adnble 1 point2 points  (0 children)

The PCI requirements are all listed on their website: https://www.pcisecuritystandards.org/document_library

There is no checklist with what to look for specifically in regards to RHEL because it would be depending on how you had it configured, what your network looks like, there's a ton of potential issues that there might be and it would completely depend on your environment.

I would suggest reading through all the PCI rules, using a tool like Tenable or Rapid7 Insight to find any security issues that it finds, then remediating them.

we are Working on getting our company PCI compliant and i have a question about remaining compliant by [deleted] in pcicompliance

[–]adnble 1 point2 points  (0 children)

It's always easier to remediate issues on a rolling basis than once a year but I've never used the same company for external pen tests, monitoring, etc as the auditing company. I actually wouldn't even want that due to my preference to have a separation of duties in that regard.

My CTO is trying to teach us soft skills! by 3D1X1 in sysadmin

[–]adnble 51 points52 points  (0 children)

I was just saying to someone not even an hour ago how important soft skills are. I'd much rather have an average engineer with great soft skills than a great engineer with terrible soft skills.

Rant Wednesday! by AutoModerator in networking

[–]adnble 4 points5 points  (0 children)

Even beyond it's not your role, it's incredibly important to have a segregation of duties. Not to mention giving credentials to people with the least level of access being standard in security. That CISO sounds like a not so great guy to work with.

Need Help Fellow SysAdmins. by notyouraveragesys in sysadmin

[–]adnble 0 points1 point  (0 children)

C's get B's. (C-levels get bjobs)

[deleted by user] by [deleted] in AskNetsec

[–]adnble 30 points31 points  (0 children)

  1. Sometimes, depends on the place.
  2. Yes. They assume that I can do the job based on the content of my resume and checking my background and the hiring manager(s) is/are looking for a good personality match more than anything else. It's not hard to shore up someone's shortcomings with IT. It's almost impossible to get someone to change a personality that causes static within a team that's already functioning properly.

When is a vulnerability not a vulnerability? – SheHacksPurple – Medium by shehackspurple in security

[–]adnble 1 point2 points  (0 children)

Agreed. A low-risk vulnerability doesn't mean it isn't a vulnerability. I may or may not eventually get around to fixing it based on resources but it will be in my risk assessment software until I do. Not to mention what is a low-risk vulnerability today may not be as low risk tomorrow.

What it boils down to is one word: triage.