Security Must Stand Up to Bullying, Harassment

Today's IT security is about much more than data loss. It's time for the security group to embrace its role in protecting the people within the organization.

How far does enterprise security go? The news of late has been filled with stories of employees behaving very badly toward other employees. The real question is whether any of that behavior is a problem for the IT security group.

Back at the Black Hat conference in July, Alex Stamos, Facebook's chief security officer, gave a keynote address in which he made a compelling case for treating cyber stalking, bullying and harassing as an IT security problem rather than just an issue for HR.

The argument for involving IT security in these human behavior issues has several components; the behavior involves computers and networks, the victims and perpetrators are both using computers, and computer security has (or should have) as one of its goals the idea of minimizing the harm done to the organization by computers and their users.

When IT security takes on abusive use of its systems, several changes in thinking are required. The first change is from searching for traffic that damages the organization's data to looking for traffic that might damage the employees. The next is a change from being on guard primarily for technology-based attacks to guarding against behavior-based threats. But the foundation change is expanding and enhancing the definition of "harm" so that any of this matters to the IT security team's mission.

The most valuable asset
One of the catch-phrases of the modern business era is that data is an organization's most valuable asset. Well, that's when corporate management isn't telling potential and current employees that peopleare the organization's most valuable asset. If we just say that people and data are an organization's most valuable assets then it's a straight-forward path from there to a position where IT security should be watching after the safety of both.

IT security is already keeping an eye on behavioral issues; just about every company now trains employees on ways to safeguard data and equipment when traveling or opening strange email messages. The security group will often amplify that with technology that looks for ill-considered user behavior and protects the organization to some extent from its effects. From a strategic point of view it's a relatively small step from those actions to protecting users from bad behavior.

A most pervasive problem
Recent revelations make it clear that harassment, bullying and intimidation are far more common than most men were willing to admit -- women (and, in similar situations, individuals who are members of minority groups) have known about these horrible behaviors all along, even when organizational structures made it all but impossible for victims to talk about them. While much of the bahvior happens IRL (in real life, or face-to-face) the electronic trail that we've seen in several of these very public cases proves that IT is involved as the means for bad behavior in many instances.

IT can rightly take credit for many developments that have made organizations more effective and brought diverse viewpoints and experiences more fully into the business world. It's time for IT security to step up to protect those voice and the people who carry them so that all of us can continue to safely and confidently move forward.

Related posts:

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Read more about:

Security Now

About the Author

Curtis Franklin, Principal Analyst, Omdia

Curtis Franklin Jr. is Principal Analyst at Omdia, focusing on enterprise security management. Previously, he was senior editor of Dark Reading, editor of Light Reading's Security Now, and executive editor, technology, at InformationWeek, where he was also executive producer of InformationWeek's online radio and podcast episodes

Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has been on staff and contributed to technology-industry publications including BYTE, ComputerWorld, CEO, Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, Dark Reading, and ITWorld.com on subjects ranging from mobile enterprise computing to enterprise security and wireless networking.

Curtis is the author of thousands of articles, the co-author of five books, and has been a frequent speaker at computer and networking industry conferences across North America and Europe. His most recent books, Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center, and Securing the Cloud: Security Strategies for the Ubiquitous Data Center, with co-author Brian Chee, are published by Taylor and Francis.

When he's not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in running, amateur radio (KG4GWA), the MakerFX maker space in Orlando, FL, and is a certified Florida Master Naturalist.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights