Welcome!

Log Management Authors: Dana Gardner, Pat Romanski, Elizabeth White, David H Deans, Carmen Gonzalez

Related Topics: Linux Containers, Microservices Expo, IBM Cloud, PowerBuilder, Weblogic, Recurring Revenue, Artificial Intelligence, Log Management, Server Monitoring, @CloudExpo, Cloud Security

Linux Containers: Blog Feed Post

The Threat Behind the Firewall

I had a different name for this blog entry but just ‘Jump Drive’ is an awful blog title

I had a different name for this blog entry but just ‘Jump Drive’ is an awful blog title.  They go by many names; jump drive, USB drive, flash drive, memory stick and a few others, but removable media is a serious threat to IT organizations.  Graduating from floppy disks, as early as 2003 articles were warning against the possible threats introduced with these devices – 256Mb for $160 back then – and yet we still see some sort of incident reported almost once a week!  From consultants, to government employees, to Mortgage lenders, to the International Space Station, what used to be a giveaway staple at trade shows, these tiny less-than-two-inch drives can hit and hurt you in a multitude of ways.

They can infect your Network. Just last week, the London Council’s systems were infested with Conficker-D due to an employee sticking an infected USB drive into a work computer.  Not only were the systems shut down, including their VoIP, they were unable to process parking tickets, library fines, benefit claims and rent collections.  With system repairs added to that, their bill will eclipse £500,000 ($825,000 USD).

They can deliver Malware.  As of 2008, 10.3% of malware was delivered by USB storage.  One of the biggest threats here is the AutoRun features on USB drives – just stick it in and the program launches.  One way to get your malware delivered is to just leave a bunch of infected, cool-looking USB drives in the parking lot of thedarth potential victim.  Unsuspecting, curious employees see the drive and wonder, ‘ohh, what’s on this?’  Before they even open email, they’re shoving the unknown stick into their computer to find out.  Mission Accomplished.  It could even happen with your own, purchased jump drive.  Maybe you have some important files that you need while traveling or at a conference and you don’t have (or didn’t bring) your laptop.  No problem, just find the USB port on the public kiosk or partner computer and problem solved.  Not so fast.  Either one of those un-trusted computers could be infected themselves – passing the strain on to you – which eventually makes it’s way onto your unit/network when you simply re-insert it.  USB threats can also come from a reputable vendor with their product documentation.

They can steal your Data. With the size and speed of some of the newer USB drives, it’s become fairly easy to quickly copy entire folders or even entire hard drives to a USB stick.  While I don’t touch on it that often, corporate espionage is alive and well especially in today’s economy.  Often due to regulation, companies are now storing much more data than ever before but not protecting or restricting access to that data.  While the spy might be external, insider threats have grown and disgruntled employees have IT departments concerned.  According to a Cyber-Ark survey, “74% of the 200 information technology pros surveyed know how to circumvent security to access sensitive data, and 35% admitted doing so without permission.”  The increased use of personal devices in the workplace also makes it difficult to track where and when data goes.  Earlier this year, the Ponemon Institute found that 88% of data breaches were caused by employee based negligence. Locking down devices, even within your own office, has become critical.

They can lose your Data. By the sheer fact that they are small, inexpensive, and we probably have a few extras, losing one of these doesn’t seem like a big deal.  But when a $10 device holds millions of dollars worth of sensitive data, it becomes a big deal.  Just last week in the UK, The Home Office had to revise it’s numbers pertaining to a data loss.  An unencrypted USB stick went missing in 2008 by one of it’s consultants and the new estimate jumped by 250,000 records.  The memory stick is still lost.  A couple others include a worker who copied data (against policy) so they could work at home and lost the stick, which was unencrypted.  Luckily, this one was found since it contained sensitive data on children but the BBC also lost a stick last year that contained kids personal data.  And even ‘Dear Deirdre’ admitted to losing a memory stick containing the personal matters of her readers.  Ponemon also found that while encryption is used widely to protect data on VPN, file servers and databases, mainframe and USB flash drive encryption are the least deployed applications.

Geeze!  But those things are so useful!’  I hear you.  I’m not suggesting eliminating all removable media, like the DoD, but there are a few pointers when they are in use.

Understand the risks involved and communicate to users.  While you might not restrict the use of USB sticks, it might be a good idea to remind your users of the potential perils when using them.

Create a Policy around the use of jump drives.  Maybe only IT provided devices can be used, or only encrypted devices or none at all.  Maybe disable or lock down USB ports on laptops that are connecting remotely.  Disable USB (maybe via Group Policy) on any un-trusted (non-IT) computers requesting access to the network.  Make sure your policy also includes what areas/subnets/VLANs of the network the user can access so sensitive data is not inadvertently removed.

Encrypt the data.  If your users are able to access sensitive data and it’s likely to be copied (for whatever reason), encrypted USB devices are the way to go.  Heck, there are even fingerprint secured USB sticks on the market.

Educate your users.  Educating your crew on all the perils of data security, Data Loss Prevention, how to handle sensitive materials and the ramifications of not doing so, can help.

Read the original blog entry...

More Stories By Peter Silva

Peter is an F5 evangelist for security, IoT, mobile and core. His background in theatre brings the slightly theatrical and fairly technical together to cover training, writing, speaking, along with overall product evangelism for F5. He's also produced over 350 videos and recorded over 50 audio whitepapers. After working in Professional Theatre for 10 years, Peter decided to change careers. Starting out with a small VAR selling Netopia routers and the Instant Internet box, he soon became one of the first six Internet Specialists for AT&T managing customers on the original ATT WorldNet network.

Now having his Telco background he moved to Verio to focus on access, IP security along with web hosting. After losing a deal to Exodus Communications (now Savvis) for technical reasons, the customer still wanted Peter as their local SE contact so Exodus made him an offer he couldn’t refuse. As only the third person hired in the Midwest, he helped Exodus grow from an executive suite to two enormous datacenters in the Chicago land area working with such customers as Ticketmaster, Rolling Stone, uBid, Orbitz, Best Buy and others.

Writer, speaker and Video Host, he's also been in such plays as The Glass Menagerie, All’s Well That Ends Well, Cinderella and others.

IoT & Smart Cities Stories
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and G...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.