{"id":7854,"date":"2022-04-19T13:51:54","date_gmt":"2022-04-19T11:51:54","guid":{"rendered":"https:\/\/nexpert.ch\/?p=7854"},"modified":"2022-05-05T17:38:40","modified_gmt":"2022-05-05T15:38:40","slug":"it-infrastructure","status":"publish","type":"post","link":"https:\/\/nexpert.ch\/en\/it-infrastructure\/","title":{"rendered":"IT infrastructure: Wipe out \u00abUnknown Knowns\u00bb and \u00abUnknown Unknowns\u00bb"},"content":{"rendered":"<p>IT infrastructure \u2013 how it started<\/p>\n\n\n\n<p>Photo by <a href=\"https:\/\/unsplash.com\/@adigold1?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\" target=\"_blank\" rel=\"noopener\">Adi Goldstein<\/a> on <a href=\"https:\/\/unsplash.com\/s\/photos\/security?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\" target=\"_blank\" rel=\"noopener\">Unsplash<\/a><\/p>\n\n\n\n<p>IT has come a long way since \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Turing_machine\" target=\"_blank\" rel=\"noopener\">The Turing Machine<\/a>\u201d was invented in 1936 by Alan Turing.<\/p>\n\n\n\n<p>The increasing semiconductors performance as well as the sinking production costs (ruled by <a href=\"https:\/\/en.wikipedia.org\/wiki\/Moores_law\" target=\"_blank\" rel=\"noreferrer noopener\">Moore\u2019s Law<\/a> and <a href=\"http:\/\/7s_second_law\" target=\"_blank\" rel=\"noreferrer noopener\">Rock\u2019s Law<\/a>) have made computing accessible to everyone and have contributed to unparalleled technological progress in science, business, and society.<\/p>\n\n\n\n<p>Large companies as well as small and medium-sized businesses quickly seized the economic potential of these technological breakthroughs and equipped themselves with increasingly complex and interconnected IT infrastructures and cloud services such as Azure\/Microsoft 365, AWS, or Google Cloud.<\/p>\n\n\n\n<p>The major drawback of this undeniable technical progress are increased operating and maintenance costs, but above all, the near impossible task of keeping on-premises systems \u00abup to date\u00bb with current security standards and protected against external attacks that have evolved almost exponentially in recent years (<a href=\"https:\/\/arcticwolf.com\/resources\/blog\/decade-of-cybercrime\" target=\"_blank\" rel=\"noreferrer noopener\">The Fascinating Decade in Cybercrime: 2010 to 2020<\/a>).<\/p>\n\n\n\n<p>One way to overcome these problems is to create new positions such as CTO (Chief Technical Officer), System Administrators (SA), System Engineers (SE), and especially CISO (Chief Information Security Officer) to manage and secure these new modern IT infrastructures, as well as the introduction of management and security software.<\/p>\n\n\n\n<p>Major corporations have the resources to invest in staff and know-how alongside with the new systems, but what about small and medium-sized businesses?<\/p>\n\n\n\n<p>Unfortunately, often due to implementation and software licenses costs, or sometimes a lack of professional advice from their IT provider, and despite having an excellent patching strategy to keep their systems up to date, small and medium-sized businesses are increasingly exposed to security breaches impacting their business activity causing liability issues.<\/p>\n\n\n\n<p>In December 2021, the Log4Shell (Zero-Day vulnerability in Log4j) cyber-attack clearly demonstrated that neither large companies nor small and medium-sized businesses were prepared for a rapid response to the threat mainly due \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/There_are_known_knowns\" target=\"_blank\" rel=\"noopener\">Unknown Knowns<\/a>\u201d (the things we think we know, that it turns out we did not) and \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/There_are_known_knowns\" target=\"_blank\" rel=\"noopener\">Unknown Unknowns<\/a>\u201d (the things we don\u2019t know to know) in their IT Infrastructure and running Operating Systems (OS) and software (see also our earlier blog post <a href=\"https:\/\/nexpert.ch\/en\/it-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">IT-Sicherheit 2021 \u2013 Ein R\u00fcckblick<\/a>).<\/p>\n\n\n\n<p>The software companies managed within a reasonably short period of time to provide patches and\/or workarounds to fix the flaw, but the general feeling was that we were trying to fly a kite in a storm.<\/p>\n\n\n\n<p>IT professionals soon realized that besides the lack of \u201ca good overview\u201d of the running environment they managed, that often outdated OS and software were in production and never were updated and\/or renewed due to high costs, or absence of regular maintenance, or just for the sake of \u201cNever touch a running system!\u201d\u2026<\/p>\n\n\n\n<p>CTOs, SA, SE and CISOs quickly understood that to thwart future cyberattacks of this magnitude, the IT infrastructures that they managed, had to undergo security vulnerability tests, drastic OS- and software inventories with tools like <a href=\"https:\/\/www.greenbone.net\/en\/vulnerability-management\/\" target=\"_blank\" rel=\"noopener\">Greenbone Vulnerability Manager<\/a>, the main goal being to wipe out \u201cUnknown Knowns\u201d and\/or \u201cUnknown Unknowns\u201d.<\/p>\n\n\n\n<p>Greenbone Vulnerability Manager is able to scan an entire IT infrastructure (Networks, Switches, Firewalls, Routers, Physical and Virtual Servers and Clients) for security flaws against a daily updated database of <a href=\"http:\/\/dia.org\/wiki\/Common_Vulnerabilities_and_Exposures\" target=\"_blank\" rel=\"noreferrer noopener\">Common Vulnerabilities and Exposures<\/a> (CVE) and allows rapidly, on a short term, to prepare effective remediation tasks to meet security and compliance standards, and on a longer term to plan a better firmware, operating systems, and software life cycle strategy.<\/p>\n\n\n\n<p>Of course, this change of strategy has costs, and the question is: Who will pay the bill?<\/p>\n\n\n\n<p>IT providers will have to make their customers aware of the new security issues and threats. They will have to offer them new security products to protect their infrastructure and make them understand that these services cannot be included in the classical maintenance contracts because of the additional costs for human know-how required for their implementation and day-to-day operation. They will need to convince their custormers that the sums invested in these security products are minimal compared to the costs generated by a partial or total cessation of activity following a successful cyber-attack, not to mention the loss customer confidence and bad reputation, especially when caused by missing security patches and old firmware.<\/p>\n\n\n\n<p>An indirect consequence of the implementation of these new strategies is that IT professionals will have to invest in new technologies and resources which in the short term could mean cash outflow. But in the long term, an unprecedented return on investment as well as a notable gain in reputation in the IT industry will follow.<\/p>\n\n\n\n<p>At Nexpert we have made this strategy change, as our main goal is improvement and seek for excellence.<\/p>\n\n\n\n<p><em>\u201cTo improve is to change; to be perfect is to change often.\u00bb<\/em> (Winston Churchill)<\/p>\n\n\n\n<p><em>\u201cSome organizations prepare for the unexpected. We expect the unprepared.\u201d<\/em> (<a href=\"https:\/\/nexpert.ch\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nexpert<\/a>)<\/p>","protected":false},"excerpt":{"rendered":"<p>IT has come a long way since \u201cThe Turing Machine\u201d was invented in 1936 by Alan Turing. The increasing semiconductors performance as well as the sinking production costs (ruled by Moore's Law and Rock's Law) have made computing accessible to everyone and have contributed to unparalleled technological progress in science, business, and society.<br \/>\nLarge companies as well as small and medium-sized businesses quickly seized the economic potential of these technological breakthroughs and equipped themselves with increasingly complex and interconnected IT infrastructures and cloud services such as Azure\/Microsoft 365, AWS, or Google Cloud.<\/p>","protected":false},"author":6,"featured_media":8123,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[41,44,43,45,46],"class_list":["post-7854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-loesungen","tag-cloud","tag-infrastructure","tag-it","tag-unknownknows","tag-unknownunknowns"],"_links":{"self":[{"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/posts\/7854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/comments?post=7854"}],"version-history":[{"count":10,"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/posts\/7854\/revisions"}],"predecessor-version":[{"id":8096,"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/posts\/7854\/revisions\/8096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/media\/8123"}],"wp:attachment":[{"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/media?parent=7854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/categories?post=7854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nexpert.ch\/en\/wp-json\/wp\/v2\/tags?post=7854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}