Subscribe
  • Home
  • /
  • TechForum
  • /
  • How the ‘broken window’ theory affects cyber security matters

How the ‘broken window’ theory affects cyber security matters

By Stefan van de Giessen: General Manager: Cybersecurity at Networks Unlimited Africa

Johannesburg, 25 Feb 2021
Michael Gaida Pixabay.
Michael Gaida Pixabay.

Here at Networks Unlimited Africa, we are applying the ‘broken window’ principle when looking at our internal cyber security posture and how it affects business processes.

The term ‘broken window’ comes from George Kelling, a criminologist, who wrote in 1982: “Social psychologists and police officers tend to agree that if a window in a building is broken and is left unrepaired, all the rest of the windows will soon be broken… vandalism can occur anywhere once communal barriers… are lowered by actions that seem to signal that ‘no one cares’.”(1) This theory had also been the subject of experiments previously (1969) by a professor at Stanford University, Philip Zimbardo.(2)

Zimbardo arranged to have a car without licence plates parked with its hood up on a street in the Bronx, New York City, and a similar vehicle parked on a wealthier street in an area in California. The poorest neighbourhoods in the Bronx, in terms of approximate average income, are also the poorest areas of New York City overall.(3)

The car in the Bronx was attacked by vandals within 10 minutes of its abandonment(4) and within 24 hours, virtually everything of value had been removed, after which further random destruction began. In contrast, the car in California sat untouched for more than a week – until Zimbardo smashed part of it with a sledgehammer. Within a few hours, this car had also been turned upside down and destroyed.

Stefan van de Giessen, General Manager: Cyber Security at Networks Unlimited Africa.
Stefan van de Giessen, General Manager: Cyber Security at Networks Unlimited Africa.

The moral of the story appears to be that, whether your property is in a ‘good’ or ‘bad’ neighbourhood, once a window is broken, people then feel that they are able to damage and steal with impunity, and without any major fear of reprisals. Kelling says: “...vandalism can occur anywhere once communal barriers – the sense of mutual regard and the obligations of civility – are lowered by actions that seem to signal that ‘no one cares’.”(5)

So, how does this theory fit into the area of IT and its role in business?

There is not normally a way for an external party to see that there are any ‘broken windows’ in a company’s cyber security. We are therefore applying a ‘broken window, broken business’ principle when looking at our internal cyber security posture.

This means, in essence, making sure that you have no ‘broken windows’ or gaps in your security through which uninvited elements could enter. In order to do this, you first need to create a firm baseline to develop your posture.

Your foundations are basic networks and segmentation, which can be achieved either in-house or outsourced to a third-party expert for a small fee. We see a lot of companies overlooking the basics and then, at a later stage, getting caught in the trap of needing to acquire solutions to plug security gaps. This could become very expensive.

We advise that, when looking to build any network and adding security on top of this, it is important to ensure that you are using human resources who are certified within their respective fields. Smaller organisations often make the mistake of using a ‘just enough’ mentality to get the network operating.

As a first step to ensure you cover all bases, ascertain whether there are any cracks in your posture – in essence, a ‘broken window’. A lack of proper network segmentation, as well as inadequate password management and a vulnerable e-mail security, are all factors that can act as broken policies.

Additionally, the endpoint is one of the most crucial vectors for attack, especially considering the current, significantly increased number of employees working from home. This is a true ‘broken window’ potential.

Organisations must ensure that endpoints are protected by a next-generation anti-virus and thereby closely monitored for any malicious activity. Traditional anti-virus has become irrelevant due to the evolution of attacks such a file-less attacks. Additionally, the endpoint needs to be able to create a secure connection to the private network at head office.

In conclusion, companies need to adopt a ‘broken window’ attitude when reviewing their cyber security posture. Establishing and maintaining the fundamentals is crucial in ensuring your environment does not fall into disrepair, and make it an appealing target to cyber criminals. If a strong foundational plan addressing the points we have discussed is maintained, your posture will remain strong, ensuring your organisation is as well protected as it can be.

(1) https://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465/

(2) https://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465/

(3) https://mycrains.crainsnewyork.com/stats-and-the-city/2013/bronx/bronxs-poorest-neighborhoods/

(4) https://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465/

(5) https://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465/

Share

Networks Unlimited Africa

Networks Unlimited is a value-added distributor, committed to empowering African businesses through innovative technology solutions. Our focus includes the world's leading security, networking, storage, enterprise system management (ESM) and cloud technologies. As a company, we are dedicated to taking our partner ecosystem to new heights. We support our partners through operational excellence, a competitive pricing strategy and strong focus on education, with the view of investing in long-term relationships. We work with competitive, resilient businesses, who are leaders in their field of excellence.

Our offerings include a portfolio of products highly regarded by Gartner, such as Altaro, Attivo Networks, Carbon Black, Cofense, Fortinet, F5, Hitachi Vantara,NETSCOUT, NVIDIA, ProLabs, RSA, Rubrik, SentinelOne, SevOne, Silver Peak, Tenable, Tintri and Uplogix.