Perimeter
Guest Blog // Selected Security Content Provided By Sophos
What's This?
12/17/2012
10:52 PM
Dark Reading
Dark Reading
Security Insights
50%
50%

BYOS: Data At Risk From Endpoint To Cloud And Back Again

Bring Your Own Software introduces data protection risks that BYOD attempts to account for. Enable your users with data protection encryption software on their own devices rather than playing IT whack-a-mole

By mid-November, Dropbox reported having more than 100 million registered users, and thanked us for it. You're welcome, Dropbox! With that many people sharing files with one cloud storage provider, what are people doing to protect sensitive and personal data?

Whether it is your resume, customer data, or compromising photos of you on a beach, it needs to be safe.

Software defects have already been in the headlines that temporarily provided unauthorized users access to other people's data. Here is one example that can happen to any software manufacturer where data was lost due to a bug.

There is risk in the longevity of some of the current cloud storage providers. Even when IT heavyweights such as Iron Mountain and EMC make an offering in the cloud storage arena, it doesn't mean success. Will you get your data back when they shut the lights off or the servers down? I doubt it, but I hope you do.

A lot of organizations are considering adopting BYOD programs. A BYOD program should consist of smart devices (phones and tablets) along with personally owned laptops, netbooks, and ultrabooks. Most organizations are limiting their BYOD programs to smart devices due to the enormous challenges surrounding personally owned laptops. No surprise.

Whittling the task down to a much smaller form factor, there are other challenges, such as mobile malware, managing vulnerabilities (checking and updating), enforcing security policies, application control, modifying the OS, data at rest protection -- and the list goes on. BYOD comes with an unavoidable by-product called Bring Your Own Software/Service (BYOS).

It looks like a daunting to impossible task to keep the smart devices under control, or the sheep in the corral, so to speak. Fortunately, there are many MDM COTS solutions available to address most of these challenges.

The devices themselves, over time, are looking to be more and more manageable, but the software and services installed on them are looking less and less manageable.

Focusing solely on data at risk, stopping data loss is a high priority in your organization, right? Or is that depending on who you ask?

Cloud Encrypted Password infographic

What the available MDM solutions lack is the ability to enable your users to share files securely with the cloud storage provider of their choice. The nonrooted or jailbroken devices themselves do not pose so much of a data risk as does the software you and your users will install on them.

After having spoken with attendees at IANS in Chicago this year, data protection with cloud storage providers was a big concern of theirs. One attendee, remaining anonymous, said he saw about 11GB of traffic directed to dropbox.com. He blocked dropbox.com, patted himself on the back, and three days later the traffic moved to Box.net. Feeling discouraged, he said, "...it was like playing IT whack-a-mole."

The conversation evolved into a plausible encryption solution that provides central key-management, agnostic cloud storage provider support, audit proof that the files are encryption, ease of use, Internet facing for secure data sharing, and support for most commonly used operating systems.

To keep this blog post from growing out of control, here's a whitepaper for more details on how to get your hands around fixing your Dropbox problem.

BYOS is about as vast as there are as many apps to download on every platform. The challenge to control them and the data they access will take more than a single technology. With applications and services that share data across cloud storage providers, you can now get in front of your data protection requirements.

No security, no privacy. Know security, know privacy.

David Schwartzberg is a Senior Security Engineer at Sophos, where he specializes in latest trends in malware, web threats, endpoint and data protection, mobile security, cloud and network security. He is a regular speaker at security conferences and serves as a guest blogger for the award winning Naked Security blog. David talks regularly with technology executives and professionals to help protect their organizations against the latest security threats. Follow him on Twitter @DSchwartzberg

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

CVE-2015-2922
Published: 2015-05-27
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?