by Jim Havron (Independent Archival Consultant)
One of my favorite Dilbert cartoons has the engineering hero explaining to upper management that he has found the source of the problem in their system. “It’s people. They’re buggy.” http://dilbert.com/strip/2015-04-24
Techies have a similar truism, “it’s not the technology, it’s the people.” This is not entirely true of course. Technology fails. But the IT Policy Compliance Group recently reported 75% of all data loss is the result of human error, and other information security research resources state between 52% and 64% of major security breaches have human error as the root cause. (Aberdeen Group and CompTIA, for example.) This suggests that there is something we can do to help keep our electronic records safe. If we can reduce the human error, risk decreases.
Once again I repeat my basic premise, stated in previous posts:
It is the archivist that is responsible for the preservation and accessibility of electronic records under their care. When a donor places his/her records into an archivist’s custodianship, the donor expects the archivist to know how to keep them safe and make them accessible. If a donor is considering giving a database as part of his/her papers, but wants to be assured that you can keep the confidential material in the database confidential, make sure that the records will be maintained over time, and made available to those who should have access, can you explain how you will assure all this? Well, obviously not in great detail, unless you are the IT professional who will care for them, but perhaps you can assure the donor that you are taking reasonable steps to protect these electronic resources.
I repeat my premise frequently because in my personal experience, archivists, like others, assume that IT is the one that is responsible for cybersecurity. While this is true on one level, the largest problem with being a cybersecurity consultant or staff member is persuading people to think about cybersecurity and act upon what they know. I recently spent hours on the phone and remotely accessing computers, in attempts to help people who had suffered data loss directly attributable to failures to follow professional advice given in the past couple of years.
That being said, I am not the only person trained in cybersecurity who I know that has almost fallen for some of the basic attacks or struggled with maintaining basic security habits. When I am in archivist mode, or any mode other than “security professional,” it is easy to fall into old habits, particularly when distracted. That is why I suggest learning to “think cyber.” I suggest developing habits that strengthen our abilities to electronically secure in the same way that we would notice a vinegar smell or dampness while strolling through our paper and film collections. Here are a few tips that I have discovered might help do this:
- Update all software, particularly the operating system, virus protection, and other malware protection, on a regular basis. If possible, check for updates at least weekly. Set your machines to apply security-related patches automatically.
- If you work in a large institution, check and see if IT controls updates and patches. It probably does. Find out when they release the patches and make sure that all your computers, including those that may not regularly be used, are on and connected to the network at that time. (A laptop that is taken into the field once every 6 months is not likely to be up to date if that is how often it is turned on.) Make sure that IT is aware of any special software you may use. Updates to such software could be blocked if they are not recognized.
- Administer credentials. Gaining access to credentials is a major method of breaking a system. Passwords should be changed routinely, at least every 3 months and anytime there is a change in personnel with password access to any of your collections, or if there has been any incident that might seem unusual and possibly represent a threat. If you have computers that are not assigned to specific people but used by any staff, try to have them on separate accounts. If possible, change the user name on public computers when you change the password.
- Learn what constitutes a strong password and create the strongest allowed by the system. Hint: Those little meters that tell you a password is weak, moderate, or strong really don’t have a clue. Use as many of the character options (capital letters, lower case, numerals, and special characters) as allowed and make the password as long as you can. The chances that it can be cracked increase logarithmically with length and complexity. Avoid using “3” for “e” or “b”, “@” for “a”, “0” for “o”, or “1” for “L”.
[It is extremely unlikely that you will be able to avoid repeating passwords for different accounts, but at least try to divide the accounts so that they are not all together. For instance, if 123456 is your password to a work account, and it better not be, use it only on another account, such as your public library. If you need to write your password down, do it in some type of code. For example, if your password is based on letters and numbers that you remember by recalling the name of children at your neighbors’ home when you were a child, write down “next door.” Never keep this list on your computer. It should be locked in a drawer or cabinet. Use the most complicated passwords you can for the most sensitive accounts, and never repeat them. If you used it once, it is likely stored somewhere.]
- Check with IT about the possibility of tokens to be used along with passwords, especially for public or general use computers. Two factor authentication using something you know (password) and something you have (token) can greatly increase access security.
- Limit access to records. Only those who need access should have access. If a computer does not need to be on a network, it should not be. Know who has access to what. If at all possible, persuade your IT staff to limit access to your records and supply you with the name or job position of those people. (This is very difficult, but will allow you to tell donors that you know exactly who can get to the records.)
- QR codes can easily be altered to contain malicious script. This is true of most images that can be accessed digitally, including video.
- If someone puts malicious script on a site linked to Amazon, and it takes only one second for security to detect and remove it, there will likely have been thousands of people exposed in that second.
- The most common victim is the target of opportunity. Automated malicious systems seek out weak defenses and attack. If Google can crawl the Internet constantly to update its database, why wouldn’t attackers crawl looking for weakness? Do not feel safe because you feel no one has a reason to attack you. Besides, defacement/vandalism is among the most common causes for cyber-attack.
- Get security specialists to train staff, particularly in social engineering and scams to persuade a person to give up information. Arrange to have someone test your security and training on a regular basis.
- Remember that a cyber-criminal does not need to obtain all the information desired from a single place. A little from you, a bit from public records, something from someone on your hacked email address book, and put it all together. Never use sensitive information as part of your ID or password.
- Put not thy faith in virus protection. It can help, but not as much as people think. Also know that malicious code can be on a machine that has been disconnected from a network for a long time before it executes, so disconnected machines are not inherently safe.
- Remember email addresses, URLs, and hyperlinks can be spoofed. Sometimes hovering the cursor over them will reveal the deception.
Now the tough one:
- Mobile devices are rapidly becoming the primary target for cyber-criminals. Both for what they contain and as a means of access to other networks. The malware designed for them is increasing by several hundred percent, and the technology changes faster than security patches can be developed. Consider disconnecting access to your network by mobile devices, at least on the premises. Consider disabling USB access on public or even staff machines. Mobile has become such a part of our lives in recent years, so this may be very difficult to do. I recently worked for a computer company doing contract work remotely troubleshooting computers for a high-security company. No mobile devices, USB devices, incoming phone calls, social networks, or email from outside the network. This is a decision that will have to be based on risk, but may be necessary.
All these tips come from things I have either personally experienced, or had demonstrated to me. Threats are very real, and often just not noticed until it is too late. Develop “cyber thinking.”
Note: In addition to personal experience and training, information used here has come from CompTIA, Aberdeen Group, IT Policy Compliance Group, and Scott Adams’ comic strip, Dilbert.

