Domain/DNS hosting, account ownership, security issues and TCO

Domain/DNS hosting, account ownership, security issues and TCO

Released Sunday, 7th April 2024
Good episode? Give it some love!
Domain/DNS hosting, account ownership, security issues and TCO

Domain/DNS hosting, account ownership, security issues and TCO

Domain/DNS hosting, account ownership, security issues and TCO

Domain/DNS hosting, account ownership, security issues and TCO

Sunday, 7th April 2024
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

Hi, good morning. You're listening to Breakfast Bites, and I'm Felicia King,

0:03

and I have a special guest, Kyle Wentworth of the Wentworth Group with us today.

0:08

And we're going to talk about, as you guys know, Kyle's a CTO,

0:12

and he's also super long-term experienced in the practical application of the

0:19

balance between business needs and IT security needs.

0:23

So we encountered a very interesting article and then we're having a pretty

0:28

interesting conversation about it.

0:30

And it was about 8,000 plus domains of trusted brands that got hijacked for

0:37

a massive spam operation. And I will post this URL to the article on Hacker News for the listeners.

0:47

But the article was not terribly clear, and it didn't really get to the nugget

0:54

of exactly what was a practical risk mitigation approach.

0:59

So I thought we'd talk about that. So welcome, Kyle. Good morning, Felicia. Yeah.

1:04

So let's talk a little bit, maybe like frame this operation of the domain hijack

1:10

for the listeners, and then we can just kind of step through it and see where it went wrong,

1:16

which then leads to concepts of how you might prevent those issues.

1:22

So do you want to start us off? So this whole

1:26

issue has to deal with domain names that were essentially released from ownership

1:33

and subdomains belonging to legitimate companies that have well-known names, ACLU, eBay.

1:44

Marvel, McAfee, Symantec, MSN.

1:50

There were many of these domain names that were listed in here that were names

1:55

that you would have never suspected would have ever been subjugated to this kind of of an attack.

2:02

And essentially hackers

2:06

came in and compromised these historically

2:10

legitimate domains and used them for broadcasting

2:14

a massive spam attack on

2:18

just the entire world so reputational

2:22

damage and then security damage and

2:26

all because i mean there

2:30

there are many reasons but the root thing that would have actually prevented

2:34

it is if they would have listened to your advice which has been yeah yeah if

2:43

you purchase a domain name you never let it go it's yours permanently and forever.

2:48

And and for for business organizations listening to the podcast,

2:54

the concept of have you ever had an alias?

2:58

You could ask this on a lot of on a lot of security documents that you have

3:04

to fill out for a passport or for whatever.

3:08

Have you ever had an alias? Well, you can't ever get rid of that alias in the IT world.

3:13

You can you can just stop paying for it and it goes away. but domain names need

3:19

to be maintained and owned. If you decide that that's going to be a, a domain name that you purchase and

3:25

you're going to broadcast with that, you have to take ownership of that for

3:30

its lifetime or this kind of an event can occur.

3:33

Somebody can, can maliciously use your brand historically for their own purposes in the future.

3:43

So that would have definitely prevented it.

3:47

So now let's break it down to the next step, saying that in the case that this

3:52

article covered, a brand had not renewed the domain because they had basically

3:58

purchased a domain for a specific marketing campaign.

4:01

And the domain was purchased in 2001, and it was released at some point in time.

4:11

And then it was purchased by malicious actors in 2022.

4:17

Now, normally, a good cleaning and scrubbing of DNS records would also have mitigated this risk.

4:29

And so one of the things that you said earlier, Kyle, was you're talking about,

4:34

you know, these are things you wouldn't expect to happen with really large organizations. I completely agree.

4:41

And it's not just on the level of, gee, they should have just continued to purchase

4:47

or renew the ownership of their domains, which really for a large organization

4:53

is an extremely nominal expense. But the second level is I would expect them to have a solid inventory of their

5:02

DNS records and to evaluate those DNS records on a periodic basis, at least.

5:12

And we look at

5:15

the at the business process that's involved in that

5:18

and yes we learn a lot of things because of of ramifications of not doing something

5:25

as we increase our operational maturity in business it's the mistakes we made

5:32

that we learned from that we don't want to make in the future However.

5:37

This kind of mistake, I mean, it's 30 or 40 years old.

5:43

This is a kind of mistake 40 years ago we made. You don't make that today.

5:52

This is proper business process in DNS management. and it should be a standard

5:58

practice inside of any network administrators list of tasks that they perform.

6:05

This is DNS 101. If you're going to get rid of something, you have to get rid of all of something.

6:13

Otherwise, the legacy of that can be utilized against you in the future.

6:18

I mean, even just yesterday, I was working on a project where.

6:23

The fact that I had to go in and look at some DNS records for a client caused

6:28

me to review our manually maintained inventory, right?

6:34

I always look in terms of total quality management and look at it and say,

6:38

what is our manually, you know, human maintained inventory of what should be there?

6:45

And then what's our digital inventory? And in the manual, human inventory,

6:50

we track things such as who made the request for that DNS record?

6:54

What business initiative was that DNS record associated with?

6:59

Who created it? Was it originated from a ticket, a project?

7:05

Is there an expected duration of time at which that's no longer valid?

7:11

Solid you know all of those things are tracked and

7:15

certainly if something is associated with a marketing

7:18

tool and let's say that marketing tool is

7:21

no longer used by the organization well gee

7:24

those dns records shouldn't exist anymore but yeah i think all of this goes

7:29

back to the those human processes that need to be there and there are some tools

7:37

some digital tools tools that really large organizations can use to assist in this matter.

7:43

But I still think there are no substitute whatsoever for tracking the business

7:48

side of who requested the DNS record, what business process,

7:53

is it associated with, was it part of like a temporary campaign.

7:58

Is it marketing related? You know, in many cases, this is, you know, 101 of resource ownership tracking,

8:04

like who is the resource owner for this? Because if it was part of a marketing campaign, which is what almost all of

8:12

these particular issues associated

8:15

with this particular article we're talking about, those were all.

8:19

Domains that were registered as part of a marketing effort.

8:24

Right. So I see this. I can't even count the number of times this year, 2024,

8:32

that this has happened already, where I get a telephone call from a client or

8:38

from a colleague that is working on a project.

8:42

And the marketing department, they'll call me up and they say,

8:46

say, hey, well, I registered this domain name with GoDaddy, or I registered

8:51

this domain name with whomever.

8:54

Who gave you permission to register this domain name? Are you the IT person?

8:58

Right. Well, no, I'm going to do this marketing campaign and I bought this domain.

9:04

Well, let's have a discussion about that for a second.

9:07

First off, the domain name that you purchased isn't the domain name for your business.

9:13

So it's not like you bought a subdomain for your business, WentworthConsultingGroup.com is our domain name.

9:21

If I'm going to do a marketing campaign on security, I might buy a domain name

9:28

for security.WentworthConsultingGroup.com.

9:32

But I own WentworthConsultingGroup.com. So if we're buying a domain name,

9:40

who has the authority to buy domain names in your organization.

9:45

It sure as heck isn't your marketing person. They should not have that authority.

9:50

They should be told they don't have that authority.

9:53

They can have all of the desires to have XYZ as a domain name for their marketing campaign,

10:00

but it's the responsibility of the technology management department to purchase

10:06

and maintain maintain and document and apply domain related information to that campaign.

10:15

It requires people who are educated in this process to do this.

10:19

So we're in the process right now of trying to unearth this mess that a client

10:26

created because they purchased a domain name and lost authentication to that domain information.

10:34

And there's no email associated with it that's associated with the business.

10:39

And the employee that did the purchasing no longer works for the company.

10:43

So, getting access to that resource that was used in these campaigns is like pulling teeth.

10:52

You know exactly what that's like. You have to have managed processes when you're

10:58

dealing with the naming structure for your company.

11:01

You wouldn't just from a business perspective,

11:05

you wouldn't just allow any Joe Snuffy inside of your company or outside of

11:10

your company for that means to go down to the county seat and register or to

11:15

your state or to the IRS and register new business entities inside of or or

11:22

as a sub entity of your company.

11:24

You can't do that from an Internet perspective either. So you have to manage

11:29

this structure with integrity and people who are intellectually responsible

11:35

and educated for maintaining domain infrastructures have to do that.

11:40

They have to be under control. Totally agree. And I think this even goes beyond the security aspect.

11:47

It's also just a cost aspect. I've done so many projects where I've had to unwind

11:53

that mess that was the result of any Joe Snuffy with a credit card was allowed to purchase things.

12:00

And frankly, the owners of the business are oftentimes equally as culpable.

12:06

You know, so it's not just the marketing department doing it,

12:11

but it takes so much time to unwind that.

12:15

And then in when there is an issue, I remember so vividly, so many times we've

12:22

had a ticket or a request from a client that's like, oh, I've got this problem

12:26

and I'm trying to solve this problem. And I'll look at it and go like, well, where's the login ID for the DNS?

12:33

In fact, for that matter, where even is your DNS hosted?

12:37

And then you get to a point where, gee, well, the DNS hosting that you have

12:42

doesn't actually support the record types that are required.

12:46

Required or the publishing time on it is so bad that you can't actually get

12:53

any sort of DNS record changes published to the world in a timely fashion to resolve the issue.

12:59

And in the case where you're like, okay, well, if we just had access to the

13:04

domain information, then we could move the DNS hosting.

13:09

Well, you can't because there's no darned inventory.

13:14

There's no standards for it. So the things that people in business decision-making

13:21

spaces think, they're like, oh, well, I'm going to buy from GoDaddy or I'm going

13:26

to buy from here because it's cheap. It's not cheap. buying from those spaces

13:32

is some of the most horrifically

13:36

expensive choices that you can make because not

13:39

only unwinding it is extremely labor

13:43

intensive but when those resources are used they just are so deficient from

13:52

a technical capability perspective that it takes so long to try to just simply resolve an issue.

14:00

I mean, so many times outages are occurring because either you can't get to

14:06

the domain hosting information, you can't get to the DNS hosting information

14:09

or the DNS hosting that exists. It doesn't publish records in a timely fashion. We use this example frequently. Yeah.

14:18

You don't you don't purchase your domain structures from just any company that

14:23

comes up with a better price. No differently than you don't hire three or four or five CPA firms to handle your taxes.

14:32

And and it sounds it sounds well, it's just a domain name. I just bought a domain name.

14:38

Well, I I just had I just hired this this tax guy to make modifications to my books.

14:45

I mean, I've got a tax guy over here who normally does my books,

14:49

but this guy over here just came in and just modified my books just for me because I just had a question.

14:54

Well, first off, that other CPA is responsible more than likely.

15:01

That other CPA has reasons that they do things the way that they do.

15:05

And it all comes down to this cost structure.

15:09

Just because I can do it today doesn't mean it's going to be beneficial tomorrow.

15:15

And the money I spend today needs to be in line with the money I spent yesterday

15:20

in order to make sure that my processes don't continue to cost me more money

15:26

in the future, spending good money after bad.

15:29

And more than likely, that good money is astronomically more expensive than

15:34

if you'd have just had your IT department handle the right task.

15:38

IT stuff should be handled by IT people. so

15:42

one of the things that you very frequently say

15:45

that is just a reinforcing

15:48

point to what you just articulated is that there can

15:50

only be one brain surgeon and i just like

15:54

to me that is like a theme song i live by

15:56

there can only be one brain surgeon somebody has to establish policies processes

16:03

protocols and then once that's in place the rest of the organization needs to

16:09

support that And the leadership of the organization needs to enforce adherence to the policies.

16:16

Nothing but chaos, turmoil.

16:21

High levels of expense, and frankly, a lot of toxicity inside of organizations

16:27

come from a lack of policies, protocols,

16:33

processes that are also enforced by the leadership.

16:37

We talk about operational maturity all the time.

16:40

And this is just one of the aspects of operational maturity.

16:45

You have to establish and add to this the Mike Michalowicz book, The Pumpkin Plan.

16:55

You have to establish whose pumpkin you're issuing to which person.

17:01

And they have to understand what pumpkin they're responsible for growing in the business.

17:08

If you're a marketing person, you grow marketing pumpkins. That's it.

17:12

That's your biggest pumpkin. You do marketing.

17:16

But as soon as it crosses the line out of application choice for CRM,

17:23

application choice for ERP, application choice for DNS management,

17:30

that's not your pumpkin. And you have to go to the person who's responsible for managing that pumpkin. Extremely important.

17:38

I think another way to think about that is that the business wants to be supportable.

17:44

In order for them to be supportable and receive support,

17:48

they have to be in alignment with standards, which means that IT does need to

17:57

set the standards, but then the business needs to adhere to the standards.

18:01

Otherwise, they shouldn't have an expectation that they're going to receive

18:05

support. And adherence from an executive perspective means dissemination of

18:11

adherence to the people in your organization.

18:15

It can't just be something that the owner says, okay, we'll take care of that.

18:18

That you as an owner of an

18:21

organization you have to disseminate how the

18:24

organization is going to run to the people within your organization and

18:28

when it comes to things like technology management dns control as we're talking

18:33

about here the dissemination of who handles what tasks in the business is very

18:39

important so that the rest of the staff can understand when i have this need this is where I go.

18:45

And that's right what you're saying. Uh-huh. Right.

18:50

So I want to pivot to a little bit more on the technical side of this now,

18:56

going back to the Hacker News article, because I think that the Hacker News

19:02

article was really not terribly clear about some of those aspects.

19:07

And I think we've certainly addressed the two core things that people could

19:12

do to prevent this issue from happening to them.

19:15

You know, key number one is if you buy a domain and you use it for some sort

19:22

of a business purpose, like a marketing campaign, even on a short-term basis,

19:26

that's it. You own that sucker forever. That's rule number one. Rule number two

19:31

would be you need to have business processes where you are handling your DNS

19:38

record management review and quality control with a completeness of level of operational maturity.

19:49

And that includes procurement side, inventory side, standards,

19:53

and the whole nine yards. This cannot be done on sort of a flim-flam basis.

20:00

It needs to be extremely rigorously structured.

20:04

And I would also like to inject that it's really the quality control of these

20:09

things I have personally experienced is above the skill set of someone that's

20:17

like a PC technician or your standard IT manager.

20:21

They just don't have that kind of background in that.

20:24

This is more like it's okay for them to follow a standard if the standard was

20:29

developed by somebody like a CISO or a CTO.

20:32

But I have yet to just see most...

20:37

Operational IT that's not in like an executive capacity come up with these standards

20:43

whole cloth on their own. I just don't see that. I mean, what's your experience?

20:46

And I completely agree.

20:49

In addition, one of the things that we see frequently is an organization will

20:56

hire a web development company to come in and build their website.

21:00

And by your expression, you know where I'm going with this. Your web development

21:04

company builds websites. They don't manage the keys to your kingdom.

21:08

Your DNS information, your domain information are essentially the keys to your business.

21:15

I've watched web development companies. You didn't pay a bill.

21:19

You didn't want to use their service anymore. They got all high on the collar and and turned off your website and you lost

21:29

access to your domain and your email stopped flowing.

21:32

And you ended up with all this big struggle as a business owner because you

21:38

gave the keys to your kingdom to somebody who wasn't responsible for managing

21:42

it, who shouldn't have been responsible for managing it.

21:45

As a business owner, you own your domain.

21:48

If you have a contract with an an external service provider like Quality Plus

21:53

Consulting to manage your DNS, that's perfect.

21:57

But because they're qualified to do the job, they should be the company responsible

22:03

for doing the management of your DNS external to your organization. But you own the DNS.

22:11

The domain name should belong to the entity, not to any other external service

22:18

provider who is managing that entity.

22:21

But if you do choose an external service provider, they need to be held accountable

22:25

for managing your domain name for you.

22:29

You've touched on so many incredibly important points here. So I continue to

22:33

encounter situations where somebody says.

22:37

Has an agreement with a web dev company, and then the web dev company will literally

22:41

go and as part of some sort of

22:44

a marketing effort, or they'll do a domain transfer, something like that.

22:49

They'll register that domain to the ownership of the marketing company.

22:54

I'm not talking about just the admin contact or the technical contact.

22:58

No, no, no, no. They list themselves as the owner. As the owner.

23:02

And I have caught these people doing that so many times, and I have called them out on it.

23:10

And the clients, if they would simply use a procurement process where they enable

23:19

themselves to be making informed decisions by engaging their CTO or engaging their CISO,

23:27

So rather than just strictly going to the web people,

23:32

all of these issues could have been avoided.

23:35

Just in the last six months, I have been engaged with a web dev company on behalf of a client.

23:43

And I think overall, the web dev company does a good job, but there are clearly

23:49

aspects that it's not their wheelhouse, that they just are not the experts on.

23:56

And so by the client having me involved, I've been able to put terms and conditions

24:02

and language in the statement of work agreements with the web dev company and

24:10

the client that represents the client's best interests.

24:14

Now, had the client not gotten me involved on that, they wouldn't be having

24:18

that as a benefit. There's so much more to DNS and the domain infrastructure

24:24

of an organization than the website.

24:29

Yes. Yes. That web hosting company doesn't handle your email.

24:32

Most commonly doesn't handle your email. They don't handle external service

24:39

providers where you have APIs connected to an external location to access or

24:46

to transmit data back and forth. They don't handle access to SQL servers or database access. There's so much.

24:56

They don't handle remote support or remote access into your network.

24:59

They handle the website. So you really need to make sure that as a business owner, you need to make sure

25:05

that your technology department is responsible in managing the DNS records in

25:11

your organization, not some other external company.

25:14

I've personally seen so many clients who have had major outages just because

25:20

they inappropriately gave access to some either external marketing firm or some

25:27

external web development firm to some records.

25:32

I had an example where a client reached out and said, oh, do you have the login

25:39

credentials to our LinkedIn company page?

25:41

Because we want to give those login credentials to the external marketing company.

25:46

Okay. Well, my head about detached from my shoulders. Okay. Because I'm like,

25:51

first of all, Well, it doesn't work that way.

25:55

Well, it can if you really want to give away the keys to your LinkedIn accounts.

26:02

Well, I mean, that is just so wrong in terms of the way to handle that.

26:06

I mean, like, first off, if there's a marketing company that literally is saying,

26:11

give us the credentials, oh, please just stop right there.

26:15

Stop using the marketing company. Just do not hire those people because their

26:19

instincts on things are so apocalypticly bad.

26:24

You know, a more appropriate request would be something like,

26:28

you know, hey, can you you grant us not like company admin,

26:33

but like a publisher poster access to your company LinkedIn page.

26:40

And then this is the email address of our person at our company,

26:44

at the marketing company, who's going to do that for you.

26:46

And we don't need to have admin just give us the ability to create posts.

26:50

I think they call that the creator role or something like that.

26:53

But the bottom line is that that that's a marketing company that actually respects security.

26:59

And I was just in an email debate yesterday with another web dev company who

27:04

was literally not even understanding the hosting technology at WP Engine.

27:12

And they kept bringing up this commentary about how, well, we need to transfer

27:18

admin. And it's like, I already have admin.

27:20

The company already has admin. Because when QPC set up the WP Engine account

27:25

for the client, we did it where it was owned by the client. QPC doesn't own it.

27:32

The company owns it. The web dev company doesn't own it. So there's really nothing

27:37

to transfer from an admin perspective. And they demonstrated through this email chain that they didn't even understand

27:47

what their preferred website hosting company is even capable of.

27:56

And, and they had some of the things that they were commenting about was like

28:00

stuff that they should have handled as part of a migration project.

28:04

They're like, oh, well, the, you know, the, the old stuff that's no longer needed

28:09

in the account, it hasn't been removed yet.

28:11

Okay. Well, whose responsibility was it to do that? It's not mine.

28:15

I'm not the web dev who was engaged to do that migration project.

28:19

So there's so many struggles,

28:23

I think, that a business has in the instance that they don't have their CTO

28:30

or their CISO involved in these sorts of vendor management engagements or vendor

28:38

relationship engagement. You bring it up so many times.

28:43

You're talking about how the technology is so nuanced and complex that the business

28:54

owner really can't all by themselves represent their interests.

28:59

You know, they really need a relationship with a CTO or a CISO who can advise them effectively.

29:08

Otherwise, you know, the only decision making factor that they really have on

29:12

things is like, well, do I like this person?

29:14

And do I, you know, think I trust them?

29:17

And, you know, do I have a referral to them from one of my friends or something

29:22

like that? But they don't really have anything other than that to specify guardrails

29:27

on the terms and conditions of the relationship. Rewind to previous podcast in UPC's Breakfast Bites list.

29:37

It is a common discussion, very, very common discussion.

29:43

Business owners think that they can wear all the hats and you just can't.

29:47

I mean, Felicia, you're a business owner. I'm a business owner.

29:52

We we understand the fact that we have to surround ourself with other people

29:56

to wear those hats it goes back to mike's book the bumpkin plan you can't wear

30:02

all the hats to manage your business, and you definitely shouldn't be wearing hats you're not technically trained for,

30:09

so you should be passing those hats off to trusted individuals to support your

30:13

business to do that Right.

30:16

I don't think we've covered this newly registered domains thing quite yet well enough.

30:22

That's another big deal. It is.

30:27

It's a massive security problem. I mean, massive.

30:30

So let me tell you my perspective on it, and then I want to hear your perspective

30:33

on it. Well, let's define it first. Let's define it first. So newly registered domain names, you are,

30:41

let's just use the one in this example, you are msn.com.

30:46

And you go out and you register msn2.com.

30:51

Because because you have another function in your business you want to do inside

30:57

of your company and you don't want it to go to your main domain name.

31:01

You want it to go to a different domain name. So newly registered domain names are domain names registered.

31:07

What is it within the last 90 days? Last what is the standard?

31:11

I think it's 90 days. Yeah. Yeah. So in the last 90 days and the struggle with

31:17

this is that most firewalls in in the corporate space and web content filtering, even on endpoints.

31:25

Correct. Oh, and even on on endpoints now. Right. With web content filtering

31:30

built into endpoint management software. Right.

31:34

Antivirus software, as we used to call it. But so those software packages are

31:39

now set to restrict newly registered domain names from just coming up on your browser.

31:46

So it'll block newly registered domain names from showing up.

31:49

And and the reason is because scammers use new domain names frequently.

31:56

They'll change a specific letter and you'll think it's that domain name and

32:00

they just they just registered it within the last two weeks.

32:04

So solutions that security professionals put in and that software developers

32:09

put in for protecting your system is to prevent you from getting to newly registered domain names.

32:17

So there's the definition. Excellent definition. Excellent recap on that definition of it. Yeah.

32:23

So there's basically a ton of risk associated with newly registered domains. domains.

32:30

And even just within the last week, I received a request for,

32:36

oh, well, we want to use these particular domains associated with marketing

32:42

efforts and we want them whitelisted. So I feel like a broken record.

32:48

I feel like the broken CISO record quite frequently when I'm saying,

32:52

okay, please do not ask me for whitelisting anything.

32:56

Creating exceptions is not legally defensible. Thank you.

33:00

And the core reason around creating exceptions, not being legally defensible,

33:07

is because as a company, you've paid for security protections.

33:13

You've paid for some level of technical controls, whether it be the endpoint

33:17

protection software and its web content filtering or web content filtering through the network layer.

33:25

Or both, right? You could even be paying for an additional layer,

33:30

because defense in depth is a fantastic concept.

33:32

You could also be paying for it through DNS filtering.

33:37

So all three of those layers, at a minimum, all three of those layers,

33:41

there's other ways to do it too. But those three layers offer the company the opportunity to not have bad mojo

33:52

delivered to their users. And so that aspect of blocking the bad mojo is oftentimes based upon dynamically

34:01

updated, curated, very professionally managed category lists.

34:09

And there's, I don't know, maybe 15 companies in the world that really do that professionally.

34:16

And that's all that they do. And they use a ton of AI to do it.

34:20

So it's generally not the IT department who is specifically managing that.

34:27

That's a subscription service. And so it becomes a professional security product that the company is paying for and subscribing to.

34:40

So it's no different than email security, scanning. Geolocation control, all of those solutions.

34:49

Right. There has to be somebody else who's maintaining this because there's

34:53

no way your IT department can maintain it.

34:56

So it becomes a technical control component of your security posture.

35:03

As such, when you fill out your cyber insurance application and your cyber insurance

35:09

application says, do you have these things in effect?

35:13

And you say, oh, yeah, we have web content filtering or, yeah, we have DNS filtering.

35:19

We have web content filtering at the endpoint layer and at the network layer, right?

35:23

So when you say to your insurance company that you have these technical controls in place,

35:30

you cannot be invalidating your cyber insurance policy by telling your IT to

35:41

create exceptions to that. To create poke holes in it.

35:45

I mean, that's essentially what you're doing by creating exceptions.

35:49

Granted, you may have approved the exception, but essentially you poked holes in your solution.

35:54

Yeah, I have a wonderful example of this, completely real world example of this.

35:59

And it's just, I mean, it's fantastic because it drives this point home very phenomenally.

36:04

So we had a client who engaged with a particular bank website on behalf of their

36:11

customers because they basically like, you know, they did accounting for them.

36:13

And it turns out that that bank website had

36:17

been compromised and so

36:20

we ended up getting a support ticket that was

36:23

like hey we can't get to this bank website you need

36:26

to allow us access to this bank website so i

36:30

go and i look at it and what is the categorization that's happening well it

36:35

came up as compromised websites which is the same sort of functionality that

36:40

is delivered through the the automatic AI classification of newly registered websites.

36:47

So the way I handled that particular request is I referred the client back to

36:53

our written policy on how we handle websites that are getting blocked.

36:59

And then I called them and had a conversation with them.

37:03

And I basically said, look, if you really deeply need to get to that website,

37:09

I would really strongly encourage you to utilize a burner computer that is not

37:20

on your company internal network because that website is compromised.

37:28

It is not even remotely legally defensible for you to access that known compromised

37:34

website from an internal work computer that has access to other sensitive data.

37:43

And so I said, if you really want to fix the problem, call the bank and tell

37:49

them that you can't get to their website because it's compromised.

37:54

Compromised and so basically i

37:57

would not create an exception for that you know because it's it's bonkers right

38:03

it's bonkers in the instances where people want us to create exceptions for

38:09

newly registered websites again i refer them back to our written policy on it and i'm saying to them.

38:17

We cannot in good conscience do this because, let's say, for example,

38:25

that newly registered website isn't fully and competently maintained.

38:31

Next thing you know, it's compromised, and now it's hosting malware.

38:36

And you've instructed us to create an exception.

38:40

Now, at the point in time that known malicious content is being hosted through

38:46

that, it's It's maybe not a newly registered website anymore,

38:50

but you've asked for your security solution to be blinded to that new categorization.

38:58

Well, you've just created a hole through your security and you will probably

39:04

get compromised adversely because of that, right?

39:06

So I think this goes back to the point of marketing needs to be working with

39:13

the CTO or the CISO or both.

39:18

Because if marketing doesn't have respect for the people in those positions,

39:24

then the productive business collaboration can't happen.

39:28

It would be awesome to be able to have that relationship with the marketing

39:34

people where they would meet with the CTO or the CISO quarterly and say,

39:41

hey, we're thinking about these business initiatives.

39:44

Is there anything that we should be doing proactively? effectively,

39:46

you know, et cetera, et cetera. So what are your thoughts about those things?

39:49

And in the, in the, that same discussion, it's not like this used to be this way.

39:59

So it didn't used to be a major issue or it didn't used to be really an issue

40:05

at all that you could create a new domain name today and have it effectively

40:10

work tomorrow for the entire world.

40:14

It's the security posture of the world that's changed, that's caused us to have

40:20

to take additional precautions in protecting clients' networks.

40:24

Works and it's these malicious

40:27

actors that are causing this

40:31

to happen we have when somebody finds a new way to break in to a house lock

40:37

companies figure out new ways to create locks to prevent people to get into

40:40

houses and this is the situation in technology so every time and this This is on a daily basis,

40:48

and the bad actors are increasing in numbers exponentially.

40:55

So the IT infrastructure is having to work overtime to stay on top of the problems.

41:03

The reason why we use all of these external resources and why companies have

41:07

to pay so much money for their solution stack,

41:10

specifically their security stack, is because you want to maintain your business

41:15

and you want to keep your business uptime as high as it possibly can be,

41:20

you don't want these bad actors from taking your networks down or causing stress in your business.

41:27

So we are having to add new solutions to this list.

41:32

Sometimes once every six months,

41:34

sometimes once a year, we have to add something new to the process.

41:38

We have to train somebody on how to do something new that they didn't have to do before.

41:43

And it's because we're trying to protect the network along the way.

41:48

So maintaining your security posture,

41:52

it's so important that you're using companies that are intrinsically connected to one,

42:01

the world's deliverance of of problems and solutions to those problems,

42:08

and that they're constantly paying attention to how those problems can affect your network.

42:14

They're implementing great standards in security and doing better than best

42:20

business practice in how they protect your company's intellectual property.

42:27

It's extremely important that you're hiring and working with extremely competent

42:32

technology technology service providers, not just somebody that's that's putting together a solution stack because they

42:41

heard about a new service on the Internet. I guess that's the gist. To that point, I think you just touched on something

42:50

that's, I think, a bit of a hot button for me.

42:53

And even just earlier this morning, I got a query from another business owner

42:59

where they were asking for the answer to a particular question.

43:05

And I pointed them to the fact that I've written white papers about that particular thing.

43:11

And I've done a number of podcasts about

43:14

that particular topic and really gone into it

43:18

in very adequate depth through those resources to make it so that someone could

43:27

be making a contextually and requirements-based informed decision about the

43:36

direction that they want to take. And this person's response to me was like, this takes too much time.

43:44

And it does. Security is a nonstop 24-7.

43:49

It's actually more like a 47 if we could cram more hours in a day.

43:55

Security is an extremely detailed process, requires a lot of people in a single

44:01

organization to stay on top of the process.

44:04

Process and even all the external tools that

44:07

we use the automated tools that we use they're not

44:10

enough to to to eliminate the

44:14

necessity of human interaction with the

44:18

process and i don't know that that's ever going to reach that level probably

44:23

not for as long as we're alive or probably the next three generations you know

44:29

it still is going to always be required somebody defines finds the requirements in a written format,

44:35

they evaluate solutions to be able to deliver an outcome against the set of requirements,

44:43

and then they actually have to do real testing.

44:47

Because the evaluation, the way I would look at it is kind of like a tabletop exercise.

44:52

Versus the real testing is, okay, now we get it and now we actually do like

44:57

a, you know, know, like a real BCDR sort of testing instance,

45:03

you know, you have your, your passive tabletop exercises, and then you have

45:07

your actual real, like incident response testing.

45:10

And I'm just using that as an example, because tabletop exercises can be used

45:14

for, you know, all kinds of things in decision making processes.

45:17

But anyways, my main point is, I just find it completely ridiculous that somebody's

45:24

response to a suite of free, this is the ridiculous part,

45:32

free resources are available to help you make.

45:38

Informed decisions, and you can't make enough time in your life to put yourself

45:45

in a position to be an informed decision maker.

45:49

Not everything in life is simply, oh, gee, I'm going to subscribe to this thing

45:56

for 150 bucks a month and it's going to solve my problems.

45:59

To me, that's the same sort of failed paradigm as I see a lot of businesses

46:04

doing where they're looking to hire IT, an external IT service provider,

46:09

and then they want to transfer all risk to that external IT service provider.

46:16

And then they want to abdicate all involvement in responsibility of delivering any of those outcomes.

46:25

When 90 to 95% of the problems in a a business are people, policy, and process.

46:33

The IT department is technical controls and support and maintenance.

46:40

If you have a CTO or you have a CISO, yes, they can help you with policy,

46:46

but unless you've given them that authority over your organization,

46:50

it becomes an officer of the the company that has to be the one who says,

46:57

I'm approving this policy, and we now as an organization will be held accountable to this policy.

47:04

I wonder, go ahead. Well, until that threshold is met, as far as I'm concerned,

47:10

the customer is not fulfilling their portion of the shared responsibility model.

47:15

I'm really wondering just how much more integrity there would be inside of businesses

47:23

today if they did put the CTO and the CISO in charge of business operation.

47:32

Oh, I mean, you just chalk that up as one of Kyle's genius statements of all

47:38

times, because I continue to have these thought processes over...

47:45

You know, wow, what would happen if the CTO became the COO?

47:51

Or if just there was a flip in order of precedence, order of responsibility, order of leadership.

48:02

Because the way that the world is running today, if that change doesn't happen,

48:07

if business executives, if CEOs don't realize that the top person in their organization

48:13

underneath of them needs to be the CTO.

48:16

CEO and and directly in line with that is the CISO, if they don't realize that here pretty quick,

48:24

these bad actors are going to consume these businesses and it's happening. It's happening.

48:32

We we see it constantly in the news. This event right now is a great example of that.

48:39

What we only see in here are just the notices of what affiliated big brands

48:48

were associated with the event.

48:50

We don't really see the ramifications of those 8,000 plus domains.

48:56

And the ramifications are ransomware, stolen PII, remote access to machines,

49:07

invasive technology solutions being deployed.

49:11

And a lot of these things we won't see.

49:15

I mean, this article came out February 26th. We won't see the ramifications

49:19

of this potentially for six or 10 months because this is what the hacker does.

49:27

They come in, they sit, they monitor without anybody knowing.

49:31

And then 10 months later, they activate.

49:35

Right. After they've gathered all the information that they were looking to

49:39

gather on the machines that they've infected.

49:41

And if you don't have a CTO or a CISO in charge of your organization's deployment

49:48

of technology and solutions decisions related to technology.

49:53

You could be bothered by this and your IT department has no clue it's even happening.

50:00

So you touched on one aspect here that I think people oftentimes do think about,

50:06

although I think they don't put enough weight on the adverse impact of the financial

50:14

adverse impact of the factors you just articulated.

50:17

I think there's another crucial one that they also typically undervalue or underestimate,

50:24

which is the adverse financial impact,

50:30

which, of course, is now just affecting the whole profitability of the business.

50:34

And the whole question is, do you want to continue to stay in business?

50:37

Because if you continue to just light money on fire, then you're not being competitive

50:42

in the marketplace and just all kinds of problems come from that.

50:47

And so by not having the right people involved with strategy and those policy decisions,

50:54

it can lead to not just the adverse financial impact of what bad actors are

51:00

up to, but it's the decisions that everybody else in the IT realm is also making in the business.

51:08

So my example of that is, let's say you have a data center and you had 500 server

51:15

workloads in that data center, and you basically had three people,

51:20

one person per shift, who was maintaining that data center.

51:23

And you've already got the real estate, you've got that building,

51:27

you're already paying the property tax on that, and all of those things, right?

51:32

Those expenses don't really go away if you move those workloads to public cloud.

51:39

But what does happen if you move those workloads to public cloud is you're now

51:45

going to pay 5 to 7x the cost of that.

51:50

Furthermore, I'll add that the

51:52

people to maintain the public cloud hosted resources are more expensive.

51:58

And then you have a completely separate risk profile, which is much harder to

52:04

manage and much harder to visualize.

52:08

In the realm of now you've got 500 servers sitting in public cloud.

52:14

Then that's a lot harder to assess and also lock down from a network access perspective.

52:23

On the other hand, those 500 servers in your data center, oh,

52:28

that becomes easy to lock down.

52:30

That opens up, once again, back

52:33

to a previous podcast about the

52:37

lack of security inside of

52:40

cloud infrastructures versus on-premise infrastructures and just the passing

52:50

off that business executives think that they can do because now they've moved

52:55

to the cloud in relationship to security.

52:59

And another point in this, in this example of this article, VMware is one of

53:06

those companies who they specifically highlight where they had two hijacked subdomains found.

53:13

Cal.vmware.com and www.vmwcal.com.

53:18

So the domain takeover, the affected domain was cal.vmware.com,

53:23

and the takeover was the second one, www.vmwcal.com. And this was hijacked in July of last year.

53:32

As we look at this, VMware is a $61.5 billion company in 2024.

53:41

They probably have processes in place on how DNS is supposed to be managed in their business.

53:49

Something went awry in that process that caused this issue.

53:54

More than likely, they have looked at that and have adjusted.

53:59

They're probably not getting rid of old domains. And they're probably doing

54:05

better at how they manage the domains that they currently have.

54:09

So, as a small business owner, as a medium business owner, as a business owner

54:16

that's not doing a billion dollars in business, let alone $61 billion in business,

54:20

it's just as important for your organization to have people in place who can

54:28

manage this data properly. You can't just think that you're not going to be affected the smaller your business becomes.

54:36

And although we'll probably have another podcast on it in the future,

54:41

there are statistics today that are showing an extensive increase in the hacker

54:51

community targeting small business.

54:54

Because they're a soft target. Because they're now being seen as a soft target

54:59

and small business under 20 employees is 88% of the population.

55:06

Yep. So if 88% of the population,

55:11

I mean, it's the whole reason why Windows computers were attacked by hackers

55:15

more than Macs were back in the day, because 97% of the population used a Windows machine.

55:22

And so there were more potential opportunities for them to gain access.

55:27

And they're realizing that in the small business capacity today,

55:30

small businesses have a lot of value to give to the hacker community.

55:34

And in the mass numbers that they are as a collective,

55:40

they give more information and easier pathways of extraction than the detail

55:49

level of work that they have to do with larger companies like VMware.

55:53

And yet VMware was still penetrated.

55:55

I didn't do any research on what cal.vmware.com was for.

56:01

I hope it wasn't client access licenses. That would be crazy.

56:06

Yeah, that would be crazy. That would be pretty apocalyptic if a component of

56:14

the licensing structure, so we're now talking about the customer licensing infrastructure of VMware,

56:22

was actually the thing that was compromised. Right.

56:27

Well, I think we've covered this very well now.

56:30

And I really genuinely hope that people finally get it, that they need to have

56:38

a CTO or a CISO or both, you know, or both.

56:43

And they need to stop asking for whitelisting.

56:46

They need to stop thinking that they're saving themselves money by not proactively

56:54

engaging the correct IT resources,

56:57

that IT needs to be their business partner and not just simply tech support, not an afterthought.

57:06

It's not an expense in your business model. It is your business model.

57:11

You are a technology company. Regardless of whether you wanted to get into technology as a technology company

57:19

today or not, technology runs your business. You don't.

57:22

You facilitate technology in your business to conduct a business.

57:26

And the better you do that, the more efficient your business becomes.

57:30

And if you don't believe it, turn it off. off.

57:33

Technology runs your business. Therefore, technologists should run your business.

57:40

You always crack me up with that. If you don't believe it, turn it off. There you go.

57:46

You should see how well that works for you, right? Turn it off. Perspective.

57:53

Oh, thank you so much for your time. Thanks, Felicia. Another great,

57:57

highly educational, free resource for people.

58:01

I just, you know, We're just trying to move the needle on this because I think

58:04

we both are so unhappy by people that get really victimized by misinformation

58:11

or a lack of their own wrong.

58:16

You know, they've got like the wrong paradigm about how this stuff goes,

58:19

goes down. You know, you can't just like delegate and abdicate.

58:23

There's no way to completely prevent it without unplugging the computer from the wall.

58:30

However, there are great ways to help protect your network and the integrity of your network.

58:36

You just have to listen to the right people to get it done.

58:40

All right. Thanks so much for your time. And hope everybody enjoyed it.

58:45

And we look forward to seeing comments. Go out to Podbean and put your comments.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features