Security Corner

April 24, 2015  1:19 PM

A Tale of Wallet Security

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
id, Lost, retail, Security

Break out your tissues because you might get a little misty after hearing my tale. I’ll tell it simply and quickly. But you’re sure to take a few things away from reading this post.

First, you’ll believe people are better than you first thought.

Next, you’ll be impressed at how much information one person can dig up on the Internet in the span of five or ten minutes.

Lastly, you’ll be A LOT more careful with your IDs and wallet for fear of losing your entire identity – and $25.

Screen Shot 2015-04-24 at 9.17.34 AM

Here we go…

Thursday, April 23, my wife went shopping at Old Navy in Hingham. I’m assuming it was to buy gifts for me because my birthday was this week and because she usually shops at high-end boutique stores. While she was there, she found a wallet.

Instead of leaving the wallet with the Old Navy personnel, she decided to take responsibility for the wallet and the items inside. The fear – and what would also motivate me – was that if you turn in an item to retail workers you lose control of what happens to the item. Essentially, if you find something you either get to keep it or you shepherd it to its rightful owner. That’s the moral law of the universe…according to me anyhow.

Moving on…she brought the wallet home, did a bit of research to find the address of the owner (simply looking at the license was enough – so no black arts of the Internet yet). Then she took $20 from the wallet (there was only $25 inside) to pay for shipping and insuring the wallet back to its owner. I then arrived home.

Once told what had happened, I took to the ether of the ‘net. In about seven minutes I had found the owner’s husband’s LinkedIN account and sent him a note. I also found the owner’s Facebook account and sent her a message. And for good measure I dug around for a phone number, but these days most people only carry a cell and those are seldom listed in

Then I went to bed.

Today, I woke up and looked at my phone. I had a phone call and a message from a number I didn’t recognize. It was the owner calling about the wallet. Now follow this chain of events…

My LinkedIN note got to her husband in CHINA. He and his wife (the wallet owner) have not spoken in a while, maybe years. But the husband is still in touch with their son and therefore told the son about the wallet being found. The son told the mother. The mother called me.

As I type this, I’m sitting in a coffee shop near that Old Navy store waiting for the woman to show up and get her wallet. I put $20 back inside because we didn’t have to ship it. 20 minutes from now I’ll know if this entire exercise has worked and I’ll hopefully see a smiling face on a stranger’s face.

Screen Shot 2015-04-24 at 9.18.10 AM

Satisfied? The world is a scary place, but there are good people in it. What I’d like you to do is imagine if the wallet had fallen into the wrong hands. Imagine if it was your data laying on the sidewalk outside Old Navy. Imagine that your data IS always on a sidewalk somewhere and the world has access to it.

If you’re at least aware of these facts, you’ll likely be much more careful with your data and the data of others. Just a heartwarming tale for you today. Next column will be much more sinister!

April 23, 2015  4:59 PM

The Marathon – Tracking the Runners…and the crowd

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, holiday, police, Security, Video

Each year I write…or I should say I have written…a post about the Boston Marathon. For my entire life I have attended the race and the Red Sox baseball game that takes place the morning of the marathon. But this year was different.

I wasn’t feeling it. Two years after the bombs exploded on Boylston Street, I decided it was time to change up my traditions and not rush into Boston to see some freezing baseball and 15,000+ runners. I decided to spend time watching both events via social media and other channels. And it was great.

Screen Shot 2015-04-23 at 12.57.14 PM

I had friends running this year and for the first time I had my eyes opened to the glory of actually tracking someone virtually as they travel 26.2 miles. I hardly got tired at all.

But this online tracking of runners and the social media updates and posts from Fenway Park and Kenmore Square got me thinking about how well-tracked we all are these days. While security had dozens – if not hundreds – of cameras in place the length of the course, the runners had chips on their bibs or on their shoes, and the populace was monitoring it all via their smartphones via Vine, Meerkat, Periscope and other live-streaming apps.

One of my friends even set up shop in the Breather space on Boylston and did a live stream. His name is Steve Garfield and I can’t remember the service he used, but it was interesting and informative. And it was LIVE as the action happened.

Does it mean we’re being monitored too closely? I’m not sure. But it certainly proves that we as a nation have the capacity to track whatever it is we want to track. In a way that makes me happy.

Screen Shot 2015-04-23 at 12.57.02 PM

I’d like to think my local police can use their high-tech devices to track gunshots via sound (and they can).

I’d like to think my government can actually track heat signatures of people trying to smuggle drugs into this country (and they can).

And I’d like to think more companies can endeavor to keep our data secure with the right methods and strategies (and they can…but when will they).

Technology allows us lots of cool advantages and access to information. Let’s make sure the companies we trust with our data know how to use this technology to keep our stuff out of the hands of the bad guys.

What do you think of the latest tech? How would you like to see tracking, video, surveillance and other technologies used?

March 31, 2015  2:04 PM

Site Hackers – Not a Friendly Bunch, Perhaps

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Blog, Code, Coding, Data, FILES, Hack, Security

My Website is down. I mean crushed and down. Nothing shows up except for a few Greek characters and there’s no way I can recover it. I know because I’ve tried, my hosting service has tried, and I’m not as technically adept as I’d like to be.

Instead of wallowing in my despair – as I did enough of that earlier on the weekend – let’s look at a few takeaways from this experience and maybe learn something. If nothing else, it will be cathartic for me and help me let go as I create a whole new site.

Screen Shot 2015-04-01 at 10.03.16 AM

1 – Contrary to what everyone warns you about, the stuff you put online is not ‘forever’. If it were, my site would still be up.

2 – Anything can be hacked. My passwords were superlong hashes of random characters. The hackers got in because on my site I also had a few old – I mean OLDE – wordpress installs that I wasn’t using any longer. The hackers accessed those blogs and then found a way to get into my current site as a whole.

3 – Coffee, Jolt soda, other stimulants will not help you think through the problem clearly. Only when I started to accept that my site was borked did I have an ephiphany. I have the files backed up to before the hack. I have some time to work on this. I might as well use this as a learning experience.

4 – All your tech friends and colleagues like to seem really busy. I’ve put out a number of calls to WordPress experts who might help get my stuff back functioning. Nobody is available. It’s not as if I ever did anything to wrong them, but it seems that nobody wants a boring challenge. It will be a challenge to go through and clean my code up. It will be boring because there’s a LOT of crap on my blog.

5 – You’re only as good as your most recent article. As nobody can read my posts or updates or recounts from my latest adventures, the only thing people can see about me now is on my Twitter page, my YouTube videos and here on the Security Corner. Until I get something back up – yes, the databases were safe – on my site, I’ll just go back to being some writer who sometimes cries about security issues.

Since I have a newfound appreciation for the troubles people can get into, I welcome your sob stories and hopefully your stories of successfully putting your sites and life back together. Ping me on Twitter or leave a comment on this blog if you have ideas on how to resurrect my stuff.

Thanks for reading! This is not an early April Fool’s joke.

March 30, 2015  1:51 PM

Easier to Break Into Your Company or a Conference Event?

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Business, Data, provisioning, Security

It occurred to me at a conference in Louisville that security isn’t an issue specific to businesses. In fact, most businesses are less secure than large conferences because of one simple reason – the staff at conferences are trained to examine the credentials of every person at their event.


Let’s compare and contrast the conference check-in table and room-proctor structure to the doors at your everyday business.

The conference check-in desk requires name and often an id for you to pick up your badge. In most cases the staff at the check-in desk knows many attendees personally. In both cases, this keeps interlopers from attending an event without paying.

Employees at your basic company hold the door for anyone dressed in business apparel who is heading into the facility. IDs are seldom checked and folks usually are more than willing to just point to the department or person mentioned by the burglar.

Try and get into a session at most technology conferences and there is a person at the door scanning bar codes. It’s akin to most events at the South by Southwest Festival in Austin, TX. If you don’t have a badge with a valid barcode, you can’t even get into a building to use the restrooms.


Stroll into any lobby at any organization – even the State House in many states – and ask to use the restroom. Usually it’s behind the security desk or out of sight of security personnel. If a tech columnist like me knows this, you realize that the best thieves and data criminals know how to get past the first line of defense at the front desk.

What are we to learn about this? First, it’s a good thing that there are usually multiple lines of defense within large data-dependent organizations. Second, you best prepare a really good fake ID and cover story if you want to attend AdobeMAX, SXSW, CES or other large conference. What’s your take?

March 23, 2015  4:46 PM

Hillary and Her Phones. Security Faux Pas or Laziness?

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Access, Business, BYOD, Data, Device, phone, SECURE, Security, Servers, systems

Hillary Clinton puzzles me. She seems really smart – in the same way her husband/president was smart. But maybe she’s missing that gene that gives some smart people common sense. It’s a theory that the more books you read – and the more degrees you have – the less common sense you have.


So should anyone who is a Masters candidate or above be limited in their security clearance? Perhaps Hillary should go through a remedial “how to keep the United States’ information safe” course. Because so many companies, both large and small, have actually figured out how to adopt a BYOD policy and keep their information safe.

It goes beyond the hardship of carrying an extra phone – see the Jon Stewart piece from earlier this month. It actually cuts to the core of whether the information you’re sharing is supposed to be vetted via existing security systems or if you want to skirt those systems.

Like me, I’m sure you have at least two email addresses. I actually have seven or so, but that’s because Google refuses to use its power for good and can’t find a way to consolidate accounts. With these multiple email addresses, you probably have a way to keep your notes sorted and safe. It seems that Hillary went a few steps beyond this and actually had a server – a physical server!! – placed in her house to house her private email conversations.


But these conversations weren’t actually private because they concerned public business and the United States. So what are we to do? What are we to think? How should anyone respond to this? It goes beyond politics and right into security. Here’s my take…

1 – If you have the resources to put the hardware necessary to run your own email in your home, you have the resources to ensure the data and discussions shared on that network/server are secure. If you’re working for the government and the info you’re sharing is government related, you should also be prepared to share that data with the public.

2 – If you understand the machinations of email servers, technology and classified communications, you should also not play dumb when asked about how many devices you carry, how many devices you can carry, and if it’s a hardship to send email from your government issued phone/device.

3 – There is no way, if the emails and communications that took place on the BYOD phone and the private server were related to running the government, that Hillary should be allowed to decide what info is destroyed and what info is kept.


Think about this as if it were Wal-Mart or Ford doing these things. The public outcry would be large and loud. And the request for better security for public (or shareholder) communications would also be deafening.

What’s your thought on what Hillary allegedly did with her technology? How would you fix it from a security standpoint? How would you fix it from a political standpoint?

Finally, do you think political officers should have different security rules than executives at large public organizations? Aren’t they similar in how they operate and the communities they serve?

March 17, 2015  5:33 PM

Home and Business Security Similarities

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Business, Data, home, provisioning, Security

Everyone freaks out because their home might not be secure. They have belongings inside that have value to a thief – and of course them. And keeping the actual property locked up and safe is the struggle they face on a regular basis.

It’s similar to what businesses go through every day – though businesses have it worse. The materials inside their walls, servers and offices are so valuable that if lost they would cripple the company. That’s why it’s so important to have a plan and a few things in mind when locking down your facility (or your home).


As we’re going to discuss next week on our Twitter chat, you need the right people in place to keep your organization secure. Provisioning, common sense and education are the three best ways to keep the riff-raff out and your precious materials and data inside.

From top to bottom in your company, let people know what access they have; how they can request increased access to data and facilities; and the procedure to bring on new employees. In fact, if you don’t have a list of security procedures in place, that’s the first place to start.

Next up, set some guidelines for access. This means keeping regular operating hours where any visitors to your facilities outside of those hours raises a red flag. In one instance I was freelancing for a technology firm that required all contractors to be off-site from 5PM to 9AM. It ensured that ‘outsiders’ were only in contact with valuable services and data during business hours. The takeaway here is to supervise all visitors.

Finally, maintain regular security protocols across the enterprise. Keep passwords changing on a regular basis. Update badges semi-annually so photos are current and provisioning is accurate. And provide regular documentation of new security processes to all employees and departments.

The last thing you want to do is leave your door open to thieves.


While it might be a bit easier to implement in your home because you have a much smaller population to educate about locking down your property, it’s similar in scope.

Ultimately, keep an eye on how you keep your stuff safe and you’ll have to spend less time keeping your stuff in view all the time.

What’s the best security tip you can share about keeping data or facilities safe?

March 4, 2015  7:21 PM

Security faux pas: Hillary Clinton used personal email for government

Ken Harthun Ken Harthun Profile: Ken Harthun
Email, Email archiving, Government IT, regulatory compliance, Security

Crazy Girl Cross Eyed And Pulling Her EarsAccording to the WeLiveSecurity blog, Hillary Clinton, who–heaven forbid–is widely believed to be the next Democratic presidential candidate, used a personal email address while working at the State Department:

The New York Times has published claims that Hillary Clinton did not have a government email address throughout her four-year tenure at the US State Department, but instead used a personal email address.

This is crazy. Not only is it extremely dangerous from the standpoint of national security, who’s to say that it wasn’t designed to conceal certain actions she took as our secretary of state?  According to the Times, Mrs. Clinton has long been criticized for a lack of transparency and an inclination toward secrecy.

Federal law states that letters and emails written and received by federal officials are considered government records. They are supposed to be retained for use by congressional committees, journalists, historians, etc. can find them. Penalties for not complying with these requirements are rare, however.

We don’t know what, if any, encryption or other security measures Mrs. Clinton’s account employed, and it’s not clear why this was allowed to happen. Surely IT security staff at the State Department objected. Any self-respecting IT security professional would insist that an official’s communications related to their job be properly secured.

February 28, 2015  4:13 PM

Security – How Much is Too Much; How Much is Too Little?

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
ATM, Data, Infosec, Security, social media

I’m regularly baffled by the incongruous nature of security in this country. We seemingly don’t have a set of standards – or even common sense – when it comes to locking down our valuable data assets and letting others remain accessible.

The event that brought this fully to mind was when I was watching Ocean’s Eleven for the fortieth time. Specifically when the group of thieves is able to get a cart with a person inside into the main vault at the Bellagio hotel and casino.


Yes, it’s fiction, but the similarities in security emphasis astound me when it comes to day-to-day activity.

Here are a list of scenarios that I’d like you to examine. At the end, I’ll tell you which ones actually occurred because security was so lax.

A Facebook page was created and the ‘person’ on the page was followed by news outlets and other fact-aware businesses.

Screen Shot 2015-02-28 at 11.01.01 AM

Thieves posed as real estate agents and were able to have unfettered access to homes in upscale towns near Boston at regular times during the week.

A car thief was able to steal an expensive vehicle just by standing around outside a luxury hotel and pretending to be a valet.


People were able to get medical services just by saying they were someone else at the reception desk at a doctor’s office.

Criminals were able to steal the credit card and ATM card data of dozens of people in a busy city just by putting a skimming device on a bank ATM.

Had enough? All of these – except the medical scenario actually occurred at one time or another in the past couple years. In fact, as security becomes more of a focus at the high end, more crimes will happen in situations where technology plays a much smaller role.

Take the valet car attendant, for example. That’s an easy scam. Just get some black sneakers, black jeans and a jacket and you can probably take any car you want from a person pulling up to a hotel.

The Facebook scam has been done hundreds of times and I actually use it as an example in my social media training sessions.

The real estate scam is an oldie but a goodie. Seldom to listing agents require you to show ID when you visit a broker or regular open house. You’re not going to run off with the entire property, so where’s the danger? It lies in figuring out the home security and coming back at a later date to clean out the house.

And skimmers are regularly found on all types of credit card machines all over big cities.

So, what are we to do if we want to remain safe and secure? Pay attention. Don’t allow yourself to get fooled by people, devices or situations. Have your wits about you and maintain good passwords for all your accounts – social and financial.


And most of all be skeptical. Keep your belongings secure, store copies of ids and credit information in a safe deposit box and in a secure online repository. Then ensure anyone you have as an agent for your stuff (home, car, social account, bank account) treats those things with the same care you would.

It only takes getting burnt once to make you wake up and pay attention. Why not do so before something bad happens?

What do you do to remain safe and secure in your daily life?

February 28, 2015  3:27 PM

Chatting about Security

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
chat, Data, Disaster Recovery, ITKE, Security, twitter

As you’ve probably noticed, we’ve been putting on a regular #ITKESecurity Twitter chat about once a month. The goal of the chat is to answer some of the questions you might have regarding security issues.

Screen Shot 2015-02-28 at 10.24.21 AM

This week we hosted a discussion based on Disaster Recovery and it went quite well. The questions – five of them – centered on your plans when disaster strikes and how you plan to recover your information and take control of your facilities in the event of an emergency.

It was a valuable talk and if you’d like to see some of the questions and responses, just visit Twitter and search for the #ITKESecurity hashtag. It should bring up the bulk of the tweets from our hour-long event.

Screen Shot 2015-02-28 at 10.24.35 AM

Join us next month for another security-focused chat and tweet along with us. Watch this space for an announcement as to date and time.


February 28, 2015  3:18 PM

Chips, Pins and Intrusive Medical Procedures

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Access, Data, id, Security

When you read about someone getting pins in their body, you immediately think about a broken bone and the procedure needed to repair it. In the medical field, we’re now hearing about pins in another way…as a security device.


These pins aren’t the titanium ones that go into ankles and hips, they’re they ones that come with credit cards and are secured by the latest chip-and-pin technology. But why is this necessary? Has there been an issue around medical record security?

I ask that tongue-in-cheek, knowing full well that Anthem and other medical insurance and service providers are fully under attack. Our data in hospitals is no safer now than it was at Target or Home Depot. And the time has come for us to take note.


Some facilities are doing just that with the aforementioned technology. They’re making it impossible for you to share your data without a membership card that is as secure as any credit card you own. In fact, I was just in a health center for a minor procedure and it amazed me at how seriously the staff is taking this breach and the issue of info-security.

It makes you feel good when the administrative assistant at the reception desk asks you for your date of birth, full name AND photo id just to let you see the doctor. It’s a bit overkill when they request the same information at other time. For example, to ensure you’re the right person to go through an intrusive and embarrassing procedure like a colonoscopy.


Seriously, who is going to hack a medical record, forge an id and then sneak into a clinic to get a medical scope jammed up their backside. But I digress. The issue of information safety in the medical realm is one we could learn from.

They’ve responded fast, fully and effectively to lock down our data and keep us safe. Perhaps it’s time the credit card companies, places like eBay and services like Uber get their ducks in a row and protect their staff and customer data.


If they don’t work on this fast and properly, I’d certainly be in favor of sending their executives for a few embarrassing medical procedures just to get their attention.

What’s your take? Should all businesses take the strong tact medical and insurance companies have instituted?

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: