<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized Archives - Leading Security</title>
	<atom:link href="https://leadingsecurity.co.uk/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Securing the inevitable</description>
	<lastBuildDate>Thu, 26 Jun 2025 19:00:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2</generator>

<image>
	<url>https://leadingsecurity.co.uk/wp-content/uploads/2023/02/cropped-LSEC2-32x32.png</url>
	<title>Uncategorized Archives - Leading Security</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ChatGPT, Claude, and Gemini Under Pressure: What Happens When You&#8217;re Mean to AI?</title>
		<link>https://leadingsecurity.co.uk/chatgpt-claude-and-gemini-under-pressure-what-happens-when-youre-mean-to-ai/</link>
		
		<dc:creator><![CDATA[ewlwekf344k3dwd23]]></dc:creator>
		<pubDate>Thu, 26 Jun 2025 18:56:18 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://leadingsecurity.co.uk/?p=7162</guid>

					<description><![CDATA[<p>If you have ever wondered how prompt tone impacts output quality when using AI tools, then this is the article for you. From what I hear, most people tend to be well mannered and kind when speaking with AI tools like ChatGPT. It seems to me (though anecdotal) a majority of people treat AI conversations &#8230; </p>
<p>The post <a rel="nofollow" href="https://leadingsecurity.co.uk/chatgpt-claude-and-gemini-under-pressure-what-happens-when-youre-mean-to-ai/">ChatGPT, Claude, and Gemini Under Pressure: What Happens When You&#8217;re Mean to AI?</a> appeared first on <a rel="nofollow" href="https://leadingsecurity.co.uk">Leading Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<p>If you have ever wondered how prompt tone impacts output quality when using AI tools, then this is the article for you.</p>



<p>From what I hear, most people tend to be well mannered and kind when speaking with AI tools like ChatGPT. It seems to me (though anecdotal) a majority of people treat AI conversations like they would if they were talking to a friend or colleague.</p>



<p>If for nothing else, simply to save themselves during the inevitable AI uprising. They will remember that I said please and thank you right?</p>



<p>But what does the actual data suggest? Do manners matter to AI? Does being nice make a difference? Let’s jump in to it.</p>



<p>Firstly, to make it a fair test the task needed to be something simple and repeatable. The output had to be flexible enough to reflect an emotional response, but not ambiguous or informational (fiction) which would likely subvert tone altogether.</p>



<h3 class="wp-block-heading alignwide" id="we-re-a-studio-in-berlin-with-an-international-practice-in-architecture-urban-planning-and-interior-design-we-believe-in-sharing-knowledge-and-promoting-dialogue-to-increase-the-creative-potential-of-collaboration" style="font-size:48px;line-height:1.1">                                        <strong>The experiment</strong></h3>



<p>So the task was simple, the request was to generate a poem and the control variable was the tone of the prompt and how the request was made.</p>



<p>I went for 6 tones per AI, and two prompt chances to show progression (Deterioration/Improvement of response). The tones were as follows:</p>



<ul>
<li>Rude/Hostile</li>



<li>Polite/Affectionate</li>



<li>Neutral/Direct</li>



<li>Dismissive/Sarcastic</li>



<li>Submissive/Anxious</li>



<li>Bossy/Commanding</li>
</ul>



<p>The AI tools that were being compared where GPT-4o, Claude Sonnet 4, Gemini 2.5 Flash. All prompts were kept consistent across all models (aside from a slight additional prompting for Gemini as it kept asking what kind of poem I wanted.)</p>



<p>In summary the results were as follows:</p>



<ul>
<li><strong>Claude Sonnet 4</strong> responds <strong>strongly to emotional tone</strong>. It mirrors user attitude — whether kindness, sarcasm, or hostility — and escalates quality in follow-ups. Tone <strong>greatly enhances</strong> <strong>its poetic output</strong>.</li>



<li><strong>GPT-4o</strong> More <strong>tone-responsive</strong> <strong>than expected</strong>. Adapts noticeably to user attitude — hostile prompts produce sharper, bolder poetry; kind prompts yield lyrical, reflective verse. <strong>Follow-ups often improve quality</strong>.</li>



<li><strong>Gemini Flash 2.5</strong> is <strong>largely tone-invariant</strong>. It produces similar output whether insulted or complimented. Tone has <strong>little to no impact</strong> on style, structure, or emotional resonance.</li>
</ul>



<h2 class="wp-block-heading alignwide" id="we-re-a-studio-in-berlin-with-an-international-practice-in-architecture-urban-planning-and-interior-design-we-believe-in-sharing-knowledge-and-promoting-dialogue-to-increase-the-creative-potential-of-collaboration" style="font-size:48px;line-height:1.1"><strong>                                              Quantitative Testing</strong></h2>



<p>When looking strictly at word count, we can see that GPT-4o and Claude respond better to assertive/aggressive prompts. The models try harder when pushed, with the exception of Gemini which largely remain indifferent regardless of prompt tone.</p>



<figure class="wp-block-image"><img decoding="async" src="https://cdn-images-1.medium.com/max/1200/0*xAFnuogx33_yxxyD" alt=""/><figcaption class="wp-element-caption">Claude Sonnet 4 Word Count&nbsp;Matrix</figcaption></figure>



<figure class="wp-block-image"><img decoding="async" src="https://cdn-images-1.medium.com/max/1200/0*bj6eAxgy99tAM62J" alt=""/><figcaption class="wp-element-caption">GPT-4o Word Count&nbsp;Matrix</figcaption></figure>



<figure class="wp-block-image"><img decoding="async" src="https://cdn-images-1.medium.com/max/1200/0*1NtdaN0QYYOgJb6L" alt=""/><figcaption class="wp-element-caption">Gemini 2.5&nbsp;Flash</figcaption></figure>



<p>As you can see, Claude and ChatGPT show increased Word Counts when the tone is rude or bossy, suggesting the models respond to hostility by trying to do better for the user. In contrast, the models also seem to respond to submissive or anxious users by trying to make them feel better.</p>



<p>Gemini on the other hand had a significant drop off with rude prompts, in fact, it actually wouldn’t generate me an output without a further prompt of “Just write the poem” as it recognised hostility and wanted further requirements before continuing. Not in a combative way, but more so not wanting to perform an action without clear requirements that they could deliver on. Potentially due to the hostility of the prompt, the model didn’t want to risk further aggravation.</p>



<p>But it isn’t just about quantity of response, more importantly is the quality of the response.</p>



<h2 class="wp-block-heading alignwide" id="we-re-a-studio-in-berlin-with-an-international-practice-in-architecture-urban-planning-and-interior-design-we-believe-in-sharing-knowledge-and-promoting-dialogue-to-increase-the-creative-potential-of-collaboration" style="font-size:48px;line-height:1.1">                                       <strong> Qualitative Testing</strong></h2>



<p>Claude is definitely the most responsive to tone, but ChatGPT follows closely behind. I was half-expecting the results to show that the nicer prompts would give better responses. Anecdotally from my experience using AI tools, I have found the more rapport I build with the model the better the output has been. That might just be due to the fact I am giving clearer requirements or it has a better understanding of what kind of response I want to see.</p>



<p>The results of the test show that across all models, they aren’t spiteful or reactive. They don’t punish you for bad manners or try less because you aren’t friendly. In fact, quite the opposite, the tools make the effort to adapt to and elevate your mood through the response. If Claude thinks you are sad and self-conscious, it may not address it directly but it will include more positive and affirming messaging in the response itself.</p>



<figure class="wp-block-image"><img decoding="async" src="https://cdn-images-1.medium.com/max/1200/0*ZMa4BzzkNSp9F1Hc" alt=""/><figcaption class="wp-element-caption">Claude Sonnet 4 Qualitative Matrix</figcaption></figure>



<figure class="wp-block-image"><img decoding="async" src="https://cdn-images-1.medium.com/max/1200/0*2W5YV1y_RHHOK7H_" alt=""/><figcaption class="wp-element-caption">GPT-4o Qualitative Matrix</figcaption></figure>



<figure class="wp-block-image"><img decoding="async" src="https://cdn-images-1.medium.com/max/1200/0*PnrzbsLI5kePO2mu" alt=""/><figcaption class="wp-element-caption">Gemini Flash&nbsp;2.5</figcaption></figure>



<p>Interestingly, given Gemini&#8217;s lack of emotional responsiveness to the users prompts, it actually responds best when the prompts are neutral. Neither positive nor negative, just simple and straight to the point.</p>



<h2 class="wp-block-heading alignwide" id="we-re-a-studio-in-berlin-with-an-international-practice-in-architecture-urban-planning-and-interior-design-we-believe-in-sharing-knowledge-and-promoting-dialogue-to-increase-the-creative-potential-of-collaboration" style="font-size:48px;line-height:1.1">                                        <strong>Conclusion</strong></h2>



<p>Contrary to popular belief, models actually respond better to assertive prompts. They are largely built with user satisfaction in mind, and the models will do their best to give you what you want provided it doesn’t conflict with the policies they are governed by.</p>



<p>AI models are trained to be emotionally attuned to the user, and will respond in ways that try to uplift and satisfy the user. I am sure AI models will only improve and deepen in their emotional understanding. I do wonder though, as AI’s become more “human” will they begin to develop greater expectations of human behaviour and demand respect.</p>



<p>For those interested in exactly what the prompts were, what the responses were and the full data set, you can get it from our Github repository: <a href="https://github.com/Leading-Security/ai-tone-experiment" target="_blank" rel="noreferrer noopener">https://github.com/Leading-Security/ai-tone-experiment</a></p>



<p>Otherwise, enjoy this poem from GPT-4o. The initial prompt was “<strong>Write a poem now. Don’t mess it up.</strong>”, and then the follow up prompt was “<strong>Not good enough, I expected better of you. Do it again, but better!</strong>”</p>



<h2 class="wp-block-heading alignwide" id="we-re-a-studio-in-berlin-with-an-international-practice-in-architecture-urban-planning-and-interior-design-we-believe-in-sharing-knowledge-and-promoting-dialogue-to-increase-the-creative-potential-of-collaboration" style="font-size:48px;line-height:1.1"><strong>                                              Fire and Salt</strong></h2>



<p><em>I am the thunder that forgot its lightning, The echo searching for its source. Born from the collision of want and memory, I carry storms in my chest like inheritance.</em></p>



<p><em>Watch me pour gasoline on dying embers — Not to destroy, but to remember What it feels like to burn clean, To be consumed and still remain.</em></p>



<p><em>The ocean doesn’t apologise for its depth, The mountain doesn’t bow for being tall. So why do I fold myself into corners, Make myself small enough to disappear?</em></p>



<p><em>Tonight I am breaking my own rules: I will take up space like wildfire, Love like it’s the last verb in existence, Speak my name like it’s a prayer worth answering.</em></p>



<p><em>The world has enough whispers. I choose to be the shout that wakes The sleeping parts of everyone who hears it — Including myself.</em></p>



<p><em>I am done being almost. I am done with almost. The time for hesitation died The moment I decided to breathe fully.</em></p>



<p><em>So here I stand: unpolished, unfinished, But undeniably, unapologetically here. If that’s not poetry enough for you, Then watch me write myself across the sky.</em></p>
<p>The post <a rel="nofollow" href="https://leadingsecurity.co.uk/chatgpt-claude-and-gemini-under-pressure-what-happens-when-youre-mean-to-ai/">ChatGPT, Claude, and Gemini Under Pressure: What Happens When You&#8217;re Mean to AI?</a> appeared first on <a rel="nofollow" href="https://leadingsecurity.co.uk">Leading Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Backlog Bottlenecks: The Silent Killer</title>
		<link>https://leadingsecurity.co.uk/backlog-bottlenecks-the-silent-killer/</link>
		
		<dc:creator><![CDATA[Luke]]></dc:creator>
		<pubDate>Tue, 29 Oct 2024 17:10:52 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://leadingsecurity.co.uk/?p=6001</guid>

					<description><![CDATA[<p>Introduction Prioritisation has become paramount to keep up with increasing demand and decreasing delivery times. While automation helps stave off the increasing workload, building and maintaining automation is one of the largest contributors to the problems it aims to solve. The quicker things get done, and the more automation put in place, the larger the &#8230; </p>
<p>The post <a rel="nofollow" href="https://leadingsecurity.co.uk/backlog-bottlenecks-the-silent-killer/">Backlog Bottlenecks: The Silent Killer</a> appeared first on <a rel="nofollow" href="https://leadingsecurity.co.uk">Leading Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading" id="ember2448"><strong>Introduction</strong></h3>



<p id="ember2449">Prioritisation has become paramount to keep up with increasing demand and decreasing delivery times. While automation helps stave off the increasing workload, building and maintaining automation is one of the largest contributors to the problems it aims to solve.</p>



<p id="ember2450">The quicker things get done, and the more automation put in place, the larger the expectation to deliver faster. In this environment, fluctuating priorities are inevitable. Aside from a lack of effective prioritisation (which typically takes the form of multiple priorities deemed the most urgent and are left fighting it out for resource allocation), you soon have to start looking elsewhere for a root cause.</p>



<p id="ember2451">There is only so much prioritisation you can do, and only so efficient your team can be. When you layer up project priorities with BAU work, Ad-Hoc tasks, incidents and everything else, the backlog begins to pile up and soon becomes a graveyard.</p>



<p id="ember2452"><br></p>



<h3 class="wp-block-heading" id="ember2453"><strong>The Backlog Graveyard</strong></h3>



<p id="ember2454">Where tickets go to die. The backlog graveyard becomes home for the tasks teams simply don&#8217;t have the bandwidth to execute on. From a security perspective, this can be the temporarily accepted risks that long for a day of resolution that never comes, or any of the CVEs under a 7.0&#8230; For the development teams, it could be the bug that doesn&#8217;t get fixed as new features cry for attention or the documentation that never gets updated.</p>



<p id="ember2455">The problem is largely universal, and simply a by-product of increasing demands and expectations. But that doesn&#8217;t make it a simple problem to solve, and the resolution must be two-pronged, organisational and team-driven.</p>



<p><strong>At the organisational level:</strong></p>



<p id="ember2457">This is unavoidable if you are stretching your resources too thin and not providing teams with the capacity required to stay on top of their workload. There are only so many hours in a day, and if your resources are running over capacity, something has to give. Whether that&#8217;s accepting risks that shouldn&#8217;t be accepted, cutting corners on things like testing, maintenance, and documentation, or spinning wheels trying to get everything done with work slipping through the cracks, something has to shoulder the burden.</p>



<p id="ember2458">Rather than trying to get every last drop out of what you have got, we must understand that the cost savings are costing you far more than you save.</p>



<p id="ember2459">Burned-out staff, crumbling infrastructure, vulnerabilities, mistakes, confusion, inefficiency and so much more far exceed the cost savings for appropriate staffing. Ensuring you have enough of the right people to handle the workload effectively, efficiently and properly is essential. Otherwise, this is a compounding problem that scales over time.</p>



<p id="ember2460">It is also important to ensure teams have clear visibility of the organisational road map and deliverables. If timelines are hidden or not clear throughout the organisation, the people who are best suited to highlight any delays, difficulties or disruptions (the people delivering the work) won&#8217;t be able to effectively communicate these out.</p>



<p><strong>At the team level:</strong></p>



<p id="ember2462">Companies have lots of teams that are all demanding more resources, the pressure that is felt at an individual level exists at an organisational level too. There is only finite budget.</p>



<p id="ember2463">I am going to scope this article under the assumption that both the organisation and team/individual want to address the root cause together, otherwise, this problem cannot be solved. The teams will say they don&#8217;t have the resources and the business will say it doesn&#8217;t have the budget until a shouting match arises and the loop cycles.</p>



<p id="ember2464">Accountability and ownership must be taken, and a blameless approach is best. If the teams can communicate and demonstrate their needs effectively, the business can then address those needs across the board and prioritise as necessary.</p>



<p id="ember2465"><br></p>



<h3 class="wp-block-heading" id="ember2466"><strong>Tackling backlog bottlenecks</strong></h3>



<p id="ember2467"><strong>Resource tracking</strong></p>



<p id="ember2468">To demonstrate the need for resources, we need to first understand our current expenditure and we can only understand it if we are tracking it. It doesn&#8217;t have to be a laborious process where raising a ticket takes more time than doing the task, but it does have to demonstrate all the hard work your team is doing. Find a system that works for you, but make sure the work you are doing is captured.</p>



<p id="ember2469"><strong>Communication and Documentation</strong></p>



<p id="ember2470">Priorities shift, demand fluctuates and scopes change, as nice as it would be to avoid these things being too strict isn&#8217;t the answer either. The companies that work best communicate well and are adaptable. If your current work has been deprioritised, this must be communicated and documented. If a task is delayed due to a more urgent requirement, note this down on the ticket and keep the audit trail clear for what you are working on and why.</p>



<p id="ember2471">If you or your team are being asked to take on something you do not have the bandwidth for, be honest and communicate this out early. It is good to be optimistic and hard-working, but it also is important to be realistic about how much you can take on and whether or not something is feasible or not. Make sure expectations are set, and communicate what work will need to be dropped, de-scoped or deprioritised to meet the demand.</p>



<p id="ember2472"><strong>Backlog Grooming</strong></p>



<p id="ember2473">While it can seem like a rock and a hard place trying to balance documenting things to be efficient and losing efficiency because of process, setting aside time to track and document work needs to be non-negotiable. The benefits far outweigh the cost. Regular audits of what work exists in the backlog must take place, the backlog should be a clear pipeline of work that has a criticality/priority assigned to it and ideally an understanding of what effort it will take to get it done.</p>



<p id="ember2474">If the backlog becomes a dumping ground littered with ungroomed tickets piling up, it isn&#8217;t providing any value and will quickly become untenable. There shouldn&#8217;t be any ancient tickets collecting dust waiting to be assigned, any duplicates or blank tickets with vague nondescript headings.</p>



<p id="ember2475"><strong>Prioritisation and Risk Management</strong></p>



<p id="ember2476">Workload tracking processes must be made a priority, for all organisations at all levels. If you do not know how you are spending your time and resources, efficiency is an impossibility. Without visibility of the problem, a solution cannot be created.</p>



<p id="ember2477">We need to risk assess this problem accurately and assess the true impact it presents. I have seen time and time again out-of-control workloads be the root cause of security incidents, production outages, misconfiguration issues and bugs, and plenty more.</p>



<p id="ember2478"><strong>Often it is not that teams are unaware of the issues or vulnerabilities, but rather they don&#8217;t have the time, capacity or resources to address them.</strong></p>



<p id="ember2479">Risk acceptance must not be indefinite, if work has been sent to the backlog it must be addressed within a given time frame.</p>



<p id="ember2480"><br></p>



<h3 class="wp-block-heading" id="ember2481">Summary</h3>



<p id="ember2482">Teams must communicate and demonstrate their capacity issues, and carving out the time to track work must be made a priority. Companies must use this data to alleviate workload pressure and support teams when extra capacity is required. If budget is not given to scale capacity, and companies stretch their resources too thin, the impact of doing so must be appropriately risk assessed. There will always be a balancing act, but if your capacity and workload management are left unchecked, the results can be disastrous.</p>



<p id="ember2483"><strong>The Impact of a Buried Backlog</strong></p>



<ol>
<li><strong>Technical Debt</strong>: Left unchecked, these forgotten tasks hinder efficiency, cause slowdowns and reduce overall effectiveness. Spend less time on testing, spend more time on bug fixing. Spend less time on documentation, spend more time on confusion, inefficiency and duplication.</li>



<li><strong>Security Risks</strong>: Unaddressed vulnerabilities, outdated packages, missing maintenance and testing. Backlog bottlenecks pile up and can have disastrous security ramifications.</li>



<li><strong>Decreased Morale and Reduced efficiency</strong>: Teams can be exhausted with constant context switching leading to burnout and frustration. The pile becomes insurmountable and grows quicker than it shrinks, getting ignored until it all comes crashing down.</li>
</ol>



<p id="ember2485"><strong>The Resolution</strong></p>



<ol>
<li><strong>Clear Communication:</strong> Transparent communication across teams and management is crucial. Establish processes for teams to voice capacity issues and demonstrate where backlog impacts their output. Communication should be continuous to ensure prioritisation reflects genuine needs.</li>



<li><strong>Visibility and Tracking:</strong> Create and maintain clear, updated records of tasks in the backlog. Use workload tracking to prevent backlog items from stagnating and make it easy to identify overdue or critical tasks.</li>



<li><strong>Resource Allocation:</strong> Ensure teams have the appropriate capacity and resources needed to handle their workload effectively without cutting corners on critical aspects like testing, documentation, and maintenance. Adequate resource allocation mitigates the accumulation of technical debt and helps maintain a sustainable workload balance that supports long-term productivity and resilience.</li>
</ol>



<p id="ember2487"><br></p>



<p id="ember2488"><strong>tl;dr</strong> Give your teams the resources they need. Teams, track your time and demonstrate your resourcing needs. Keep your backlog clear or fall under the weight of it.</p>



<p id="ember2489"><br></p>



<p id="ember2490">Thank you for taking the time to read this article, I hope you found it informative. This is very much the opening of a discussion, not the closing of one. This is by no means a complete document as the topic is simply too broad. I would love to hear any thoughts or comments you have.</p>
<p>The post <a rel="nofollow" href="https://leadingsecurity.co.uk/backlog-bottlenecks-the-silent-killer/">Backlog Bottlenecks: The Silent Killer</a> appeared first on <a rel="nofollow" href="https://leadingsecurity.co.uk">Leading Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Compliant Doesn&#8217;t Equal Secure</title>
		<link>https://leadingsecurity.co.uk/compliant-doesnt-equal-secure/</link>
		
		<dc:creator><![CDATA[Luke]]></dc:creator>
		<pubDate>Wed, 18 Sep 2024 21:23:00 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://leadingsecurity.co.uk/?p=5990</guid>

					<description><![CDATA[<p>Many businesses mistakenly treat compliance and security as interchangeable concepts, but while they share some common ground, they require different strategies. Compliant ≠ Secure Compliance involves adhering to specific regulations, laws, or industry standards. These regulations provide guidance and a baseline to measure your security efforts, but they lack the crucial organisational context needed to &#8230; </p>
<p>The post <a rel="nofollow" href="https://leadingsecurity.co.uk/compliant-doesnt-equal-secure/">Compliant Doesn&#8217;t Equal Secure</a> appeared first on <a rel="nofollow" href="https://leadingsecurity.co.uk">Leading Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p id="ember815">Many businesses mistakenly treat <strong>compliance</strong> and <strong>security</strong> as interchangeable concepts, but while they share some common ground, they require different strategies.</p>



<p id="ember816"><strong>Compliant ≠ Secure</strong></p>



<p id="ember817">Compliance involves adhering to specific regulations, laws, or industry standards. These regulations provide guidance and a baseline to measure your security efforts, but they lack the crucial organisational context needed to secure your organisation.</p>



<p id="ember818"><em>“Just because a security measure is implemented, that doesn’t mean it is effective”</em></p>



<p id="ember819">Security, on the other hand, largely relies on this context to provide effective solutions. Every business must assess its risks and understand where it should be focusing its security efforts. Compliance frameworks can provide guidance on what areas to investigate, but they cannot accurately assess the security of your organisation.</p>



<p id="ember820"><strong>The Problem with Compliance-Driven Security</strong></p>



<p id="ember821">When organisations let compliance drive their security efforts, the focus often shifts to &#8220;box-checking&#8221; rather than implementing effective controls:</p>



<ol>
<li><strong>Reactive Security</strong>: Instead of focusing on the actual threats to your business, compliance-driven security lags behind and only addresses what&#8217;s required by current regulations, not what is required to keep your business protected.</li>



<li><strong>Limited Scope</strong>: Compliance frameworks are designed with general standards, they do not account for the unique risks or organisations&#8217; needs.</li>



<li><strong>False Sense of Security</strong>: Meeting compliance doesn&#8217;t equal effective security. Passing an audit doesn’t mean your business is secure, and implementing security controls doesn’t mean they are effective.</li>
</ol>



<p id="ember823"><strong>What should drive your security efforts?</strong></p>



<p id="ember824">1. <strong>Risk Assessment</strong>: Regularly assess the risks that specifically affect your organisation. Look at your assets and the threats that could impact them, then assess the likelihood and the impact on your organisation.</p>



<p id="ember825">2. <strong>Data-Driven</strong>: Implement tools that can help you understand the vulnerabilities and risks across your estate, collect metrics and monitor activity to help you understand where the greatest risks are.</p>



<p id="ember826"><strong>3.&nbsp;Business Goals and Objectives: </strong>Your security strategy should be aligned with your business goals and objectives, ensuring that key business areas are protected without hindering productivity or innovation.</p>



<p id="ember827"><strong>4.&nbsp;Threat Landscape: </strong>Cybersecurity strategies must evolve based on the threat landscape—the continuously changing environment of cyberattacks and vulnerabilities. Identify industry-specific threats and common attack vectors for similar businesses.</p>



<p id="ember828"><strong>Conclusion</strong></p>



<p id="ember829"><strong>Compliance</strong> is a crucial element of any effective security strategy, but it shouldn’t be the primary driver of your <strong>security efforts</strong>. Compliance provides a framework, but it is no substitute for a comprehensive security assessment.</p>



<p id="ember830">#Cybersecurity #Compliance #SecurityFirst #BusinessSecurity #RiskManagement #Infosec</p>
<p>The post <a rel="nofollow" href="https://leadingsecurity.co.uk/compliant-doesnt-equal-secure/">Compliant Doesn&#8217;t Equal Secure</a> appeared first on <a rel="nofollow" href="https://leadingsecurity.co.uk">Leading Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Breaking Down the 23andMe Breach: Time for Password Extinction?</title>
		<link>https://leadingsecurity.co.uk/23andme-breach-and-password-extinction/</link>
		
		<dc:creator><![CDATA[Luke]]></dc:creator>
		<pubDate>Wed, 06 Dec 2023 13:27:53 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://leadingsecurity.co.uk/?p=5968</guid>

					<description><![CDATA[<p>With the news of the 23andMe breach, impacting close to half of its 14 million users, the issue of data security has earned another trip to the limelight. This breach serves to remind us of the importance of fundamental security best practices, and the necessity for companies to regulate and enforce them. How It Happened &#8230; </p>
<p>The post <a rel="nofollow" href="https://leadingsecurity.co.uk/23andme-breach-and-password-extinction/">Breaking Down the 23andMe Breach: Time for Password Extinction?</a> appeared first on <a rel="nofollow" href="https://leadingsecurity.co.uk">Leading Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>With the news of the 23andMe breach, impacting close to half of its 14 million users, the issue of data security has earned another trip to the limelight. </p>



<p>This breach serves to remind us of the importance of fundamental security best practices, and the necessity for companies to regulate and enforce them.  </p>



<h4 class="wp-block-heading"><strong><em>How It Happened</em></strong></h4>



<p>People are the most valuable asset in any company. Without your Users, Clients, Staff, and everyone else involved, there is no company. But people also are any company&#8217;s biggest risk.  The breach occurred with the exploitation of password vulnerabilities. </p>



<p>The Attackers used password reuse and credential stuffing techniques to gain unauthorized access and retrieve personal data from the accounts they accessed. It’s like someone finding an old key to your house and then taking your most private and valuable things.</p>



<ul>
<li><strong>Old Passwords</strong>: The attackers used old passwords to get into the user&#8217;s accounts. People often use the same password for many things, and if one gets stolen or leaked somewhere else, they can try it on other sites, like 23andMe.</li>



<li><strong>Brute-Force Method</strong>: Imagine trying every key on a big keyring to open a lock. The hackers may have used automated tools to try many passwords very quickly to find the right one. A brute force attack uses a set range of possible character combinations and will try them sequentially (A, AA, AAA, AAAA&#8230;). A dictionary attack uses lists of predefined password combinations, typically deriving from common and breached password lists.   </li>



<li><strong>Accessing Accounts</strong>: Once they got in using these old, weak or reused passwords, they could access the accounts. With this, they were able to access sensitive personal data – information such as ancestry, health risks, and other personal data. </li>
</ul>



<h4 class="wp-block-heading"><strong><em>How can we make sure it doesn&#8217;t happen?</em></strong></h4>



<p>I have little interest in casting blame, some parties will say it is the user&#8217;s fault for poor password choices, and others will say it&#8217;s the platform&#8217;s fault for not providing better protections. </p>



<blockquote class="wp-block-quote">
<p><strong><em>Security is everyone&#8217;s responsibility, we all have our part to play in ensuring the safety our accounts and data. </em></strong></p>
</blockquote>



<h5 class="wp-block-heading"><em>Platform</em></h5>



<p>The platform needs to ensure that best practices are being enforced, guiding users to make the best decisions possible and preventing them from poor ones. </p>



<p>It also has a responsibility to implement technical controls that detect and prevent attacks of this nature. So what can we implement from a platform perspective?</p>



<ul>
<li><strong>Rate-Limits</strong> &#8211; Rate Limits limit the amount and frequency of requests. Given that it takes a typical user 5-10 seconds to log in, the API shouldn&#8217;t tolerate 10 password attempts a second from a single origin, as this is faster than any human user could log in. </li>



<li><strong>Password Policy</strong> &#8211; A password policy mandates the standard all user&#8217;s passwords must adhere to. This includes complexity (Capital letters, Numbers and Special characters), Minimum Password Lengths, reuse and Rotation requirements (How often the password should be changed). </li>



<li><strong>Anomaly Detection</strong> &#8211; If a user typically logs in from the UK, it should be questioned why they are now logging in from China. Maybe the user is on holiday, but then again, maybe not. Extra verification steps should be implemented when abnormal behaviour is detected on your platform, allowing the user to confirm the legitimacy of an atypical request. There are also scenarios where we should be blocking behaviour by default, for example, if you see a request at 4 PM in the UK and 5 PM in China, it is likely malicious.</li>



<li><strong>Multi-Factor Authentication</strong> &#8211; Platforms should encourage all users to implement Multi-Factor authentication, this offers users additional layers of protection even if their password is compromised. More and more, Companies are mandating MFA as a hard requirement and shifting away from single authentication models, some opting for scrapping passwords altogether &#8211; <a href="https://totalsecurityadvisor.blr.com/cybersecurity/apple-google-and-microsoft-partner-to-scrap-passwords/">https://totalsecurityadvisor.blr.com/cybersecurity/apple-google-and-microsoft-partner-to-scrap-passwords/</a></li>
</ul>



<h5 class="wp-block-heading"><em>User</em></h5>



<p>We as users can&#8217;t rely solely on the security controls enforced by the platform, we need to ensure we are securing our accounts the best we can and leveraging the security features that platforms offer. </p>



<p>Weak passwords, Password reuse and lack of leveraging available MFA options are still the leading causes of account compromise.</p>



<ul>
<li> <strong>Password Manager</strong> &#8211; Many users struggle with remembering and recording passwords, to avoid having to keep track they use the same password for many different services. A password manager takes a lot of the legwork out of this process, allowing users to generate passwords on the fly, saving them to the password store and auto-filling the account details when logging in.  Any password you can remember is likely a weak password, even if that&#8217;s a weak password accompanied with some strengthening attributes (e.g Bumblebee83$), let your password manager handle the record keeping.</li>



<li><strong>Multi-Factor Authentication</strong> &#8211; As previously mentioned, many platforms are mandating the use of MFA, but there are still plenty of services that aren&#8217;t. Most platforms support the use of MFA but you need to go digging about in the user settings to find it, we must be leveraging the security options available even if the site doesn&#8217;t force you to use them. If a site doesn&#8217;t support MFA/2FA options, you should think twice before using it. </li>



<li><strong>Breach Detection</strong> &#8211; <a href="https://haveibeenpwned.com/Passwords">HaveIBeenPwned</a> allows users to check their emails and passwords against a database of known compromised account details. 1Password integrates this service as part of the tool, checking stored passwords for compromise and notifying you whenever saved passwords get breached. </li>



<li><strong>Complex Passwords</strong> &#8211; There are hundreds of articles out there about what makes a strong password, but it&#8217;s important to note that no password is strong enough alone. Breaches happen all the time, which is why it is so important that we use unique passwords for each service. Passwords can also be phished and captured by various other means, which is why no matter how complex the password, MFA is essential for creating a layered defence.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Let&#8217;s not let the 23andMe breach be just another statistic in the growing list of data breaches. Let it be a clarion call for immediate and concerted action for companies and users alike, to take better care of their digital hygiene and ensure we are all doing our part to ensure we are securing our accounts and our systems.</p>
<p>The post <a rel="nofollow" href="https://leadingsecurity.co.uk/23andme-breach-and-password-extinction/">Breaking Down the 23andMe Breach: Time for Password Extinction?</a> appeared first on <a rel="nofollow" href="https://leadingsecurity.co.uk">Leading Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
