How should your IT help desk work to help you secure your data?
Let me start with a story:
About a year ago, I received a frantic call from a business owner that needed figuring out how their business data had gotten compromised. Nearly 40 THOUSAND dollars had been wired from their business accounts and some other passwords had been changed. When no one on their team—including their IT department—had a clue as to what had happened, the owner decided to reach out to an outside source (Zog, Inc.) to evaluate what had happened.
Having performed a root cause analyses of their help desk, it was crystal clear what had happened: their help desk had gotten hacked!
Apparently a lady—supposedly the CEO—called in to the help desk asking for her administrative password. Having provided enough information to be believable (most of which could have been found on LinkedIn or Facebook), the help desk technician fielding the call reset her passwords on the phone.
Over the following few weeks, money started being spent from in marginal increments from one of the business accounts and a couple of unnoticed credit card charges started popping up in the CEO’s name. It wasn’t until the end of the month when someone on the accounting team noticed these discrepancies in full and alarmed the CEO and later the owner of the problem.
After interviewing the help desk technicians, one of the help desk techs remembered talking with the CEO a few weeks back, but had thought nothing of it at the time. With no training on how to handle sharing password credentials and being new on the team, he thought it best to be as helpful as possible and had no doubt in his mind that he was not talking to the real CEO.
How should have your IT help desk have handled a password request call?
First and foremost, verifying user identity is critical. Your help desk team needs to consistently verify the legitimacy of your users. This is an especially paramount necessity nowadays because social engineering phishing campaigns have started aiming their targets on help desks!
Since most users are typically less sophisticated than your help desk technicians, consider having your IT help desk simplify an authentication process when users call into the help desk. You should especially expect authentication when credentials are being changed, updated or given to a user.
Here are a few easy steps to make sure your users are getting quick authentication, while protecting your business from hackers:
But Most importantly, Make Your IT Help Desk Heed Their Own Advice!
Because IT help desks are often inundated with user issues—ranging from simple to some very complex problems—it is quite easy for them to forget basic security measures that they harp on you and your team to follow. Often some of the most egregious security flaws are a result of IT help desks failing to completely follow a protocol or abide by your industry’s security compliance policies.
But the reality is that good security hygiene starts with your IT help desk. They should be IT professionals ingrained with the expertise of (1) recognizing social engineering attacks or suspicious requests, (2) ensure your systems are well-secured, (3) completely understand proper credential hygiene. You shouldn’t be expected to manage their security mistakes—because they should be held to a higher standard than you and your users.
Which brings up a final point…
You IT help desk needs to be empowered with the right information to support your users and your business. They should be focusing on keeping you and your team secure (NO security flaws permitted!).
You might expect your IT help desk technicians to know better—understand how to check your user’s identity, create and curate safe passwords and keep your business safe. You might expect your IT help desk to NEVER fall for a hack or phishing attempt. But are you sure you’re in good hands?
Is your help desk helping hackers? Contact us TODAY for a help desk security assessment to make sure your help desk solution is not keeping you in the dark for some major security vulnerabilities.