Tech workers - what did your IT Security team do that made your life hell and had no practical benefit?

One chestnut from my history in lottery game development:

While our security staff was incredibly tight and did a generally good job, oftentimes levels of paranoia were off the charts.

Once they went around hot gluing shut all of the “unnecessary” USB ports in our PCs under the premise of mitigating data theft via thumb drive, while ignoring that we were all Internet-connected and VPNs are a thing, also that every machine had a RW optical drive.

Rolive,

Some corporate BS screen lock application that replaces the built in Windows feature. It would take several minutes to log in because of that.

Fortunately you can kill the process with taskmanager and prevent the screen from locking entirely. Lol.

Muscle_Meteor,

This is what i have to do to log into microsoft fuckin teams on my work laptop when i work from home…

  1. Unencrypt my laptop hardrive
  2. Log into my OS
  3. Log into the VPN
  4. Log into teams
  5. Use the authenticator app on my phone to enter the code that is on my screen
  6. Use my fingerprint on my phone to verify that i am the person using my phone…

Step 5 was introduced a few months ago because the other steps weren’t secure enough. This is why half my colleagues aren’t available when they work from home…

I suggested that we just use slack as our work chat and leave teams as a red herring to dissapoint extremely talented hackers.

jasondj,

Don’t reuse passwords!

But make them complicated!

Don’t write them down!

Change them every week!

Tischkante,

Everything only needed because it only helps to meet a security standard and to lower insurance. So much useless outdated stuff.

thantik,

Haha, I never thought of this but…I WAS the IT department in a previous life. I never really thought about how none of this shit really affected me. Granted, I’d have everyone using Yubikeys+Password for logins if I were in charge now.

pirrrrrrrr,

Yubikey enforcement is ass in AD.

We’ve moved to SilverFort. That way I can keep using the YKs but actually enforce them correctly. It allows WAAAY more visibility and control over the things that matter, and it’s diagnostics and easy policy generation from lookups is great.

KISSmyOS,

This is done to keep employees from sticking in unknown thumb drives that could install malware. Several critical systems on protected networks have been hacked in the past by leveraging human curiosity and placing a compromised thumb drive on the ground in the companies parking lot. Gluing shut the USB ports is a simple defense against that.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • asklemmy@lemmy.world
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #