arkusM
Well-known Member
- Joined
- Apr 12, 2007
- Messages
- 560
So my company does business with a huge bank in the US, that sort of rhymes with "hold", anyway I requested that they send statements/invoices to me via email, no problem...
Well they sent me an Excel file that was password protected and then emailed me the password they used to "protect" the excel file (If we are worried email about security then why are you sending passwords via email? ).
I opened the excel file with the given password and in Sheet1 was two embedded PDF's... Which I was not able to open for whatever reason. After a couple of back and forths I said just send my the PDF's, which they did, but this was in their postscript of the email:
Really, a secure alternative? an embedded object? If I had the ability to intercept email the ability to crack the excel password would barely be an annoyance, let alone secure the information. Did these guys hire the TSA for advice?
Using the limited tools in my corporate sandbox, would not zipping it and password protecting the zip file be more secure? or if I was a multi-billion dollar mega-corp and could spend some jack on a product, any other of a hundred other methods actually provide some semblance of security?
Another bank I deal with sends their stuff via something called "Ironport" it at least something more than the pretext of security.
Ah the Theater of Security - if it was not so maddening then it would be hilarious.
Well they sent me an Excel file that was password protected and then emailed me the password they used to "protect" the excel file (If we are worried email about security then why are you sending passwords via email? ).
I opened the excel file with the given password and in Sheet1 was two embedded PDF's... Which I was not able to open for whatever reason. After a couple of back and forths I said just send my the PDF's, which they did, but this was in their postscript of the email:
[bolding is mine]Although G______ has offered addressee(s) named above a secure alternative to sending the information contained in and accompanying this communication, addressee(s) named above have selected this insecure means at their sole risk and agree that G______ shall have no liability and shall indemnify G______ for any loss, liability, cost, expenses, demands, charges and claims of any kind resulting from the use of this insecure means. If this is incorrect, please contact your G_____s representative and ask for the secure alternative.
Really, a secure alternative? an embedded object? If I had the ability to intercept email the ability to crack the excel password would barely be an annoyance, let alone secure the information. Did these guys hire the TSA for advice?
Using the limited tools in my corporate sandbox, would not zipping it and password protecting the zip file be more secure? or if I was a multi-billion dollar mega-corp and could spend some jack on a product, any other of a hundred other methods actually provide some semblance of security?
Another bank I deal with sends their stuff via something called "Ironport" it at least something more than the pretext of security.
Ah the Theater of Security - if it was not so maddening then it would be hilarious.