Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

08:05 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

IBM's USB Ban Earns Some Praise, Some Skepticism

In a bold move that has security experts talking, IBM is reportedly looking to ban USB drives, as well as other portable storage devices, for its employees.

IBM is looking to create a more secure internal environment by reportedly banning all USB drives, as well as other portable storage devices, for its employees. The company is, instead, encouraging workers to use the company's cloud-based file and data sharing service to move data around internally.

The decision, first reported by The Register, is a bold move for IBM as the company looks to lock down its internal security at a time of heightened awareness around insider threats and the damage careless employees can cause. (See Insider Threats Cost Enterprises More Than $8M Every Year Report.)

Even IBM notes that the decision, which was made by Shamla Naidoo, the company's CISO, is bound to be disruptive for some employees as it rolls out company-wide over the next several weeks after being tried out in certain divisions first, according to the report.

Big. Blue. USB-Free\r\n(Source: IBM)\r\n
Big. Blue. USB-Free
\r\n(Source: IBM)\r\n

IBM itself is not confirming the specifics of the report, only that the company does review its internal security policies on a regular basis.

"We regularly review and enhance our security standards and practices to protect both IBM and our clients in an increasingly complex threat environment," a company spokesman wrote in an email to Security Now.

When a company as big as IBM makes an internal security shift, it will be noticed, and copied, by other companies. IBM's move reminds companies that the weakest link in the security chain could be the person in the next cubicle, whether or not he or she has malicious intent. (See Cybercriminals Increasingly Targeting 'Crown Jewels' Both Inside & Out.)

The havoc a small device such as a USB stick, SD card or flash drive can cause is not lost on other security watchers.

"Frankly, I find it funny that they still hand these out at security tradeshows," Mukul Kumar, the CISO and vice president of Cyber Practice at Santa Clara, Calif.-based Cavirin, wrote in an email. "IBM's move is a step in the right direction in that external USBs have, over time, been a major vector for malware."

Kumar notes that even if some exceptions are made, it's a step in the right direction, but banning certain devices is not enough. He writes:

However, the proof will be in how they "sign" these drives to be readable. Their move is part of a broader approach to security-in-depth to protect the overall cyber posture of an organization. This includes perimeter, network, OS, application, and data, spanning both hardware and software.

Nathan Wenzler, the chief security strategist at AsTech, a San Francisco-based security consulting company, noted that the banning of USB and other devices is a significant security change since these tools are a legitimate concern for CISOs.

However, is it worth adjusting an entire company culture?

"We've simply gotten used to having these easy tools around, and to now ban them out of a concern for security is going to be incredibly difficult to accomplish, as you're not just turning on new technical security controls, but you're now trying to change the culture of how people have operated for a very long time," Wenzler wrote in an email. "Ultimately, this sort of culture shift may not be worth the kind of ban IBM is putting in place in lieu of other security controls that could protect their intellectual property, critical data and corporate reputation without upending the way people are used to conducting business."

The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

Wenzler went on to add that the cloud-based system that IBM wants employees to use brings its own share of security concerns:

Not to mention that the online file sharing tools that are being provided as an alternative come with a whole bevy of technical challenges that employees are already bringing up (i.e., "What do I do for a system that isn't connected to a network?").

However, Boris Vaynberg, CEO and co-founder of Solebit, an Israeli security firm, wrote that IBM is addressing a major concern for companies of any size: the endpoint -- a major weakness no matter how sophisticated the internal security of company is.

"The endpoint is the last layer of defense, and once you allow the ability to connect removable storage that may contain malware, you are skipping, by definition, any other security measures that you have on your network," Vaynberg wrote. "Today, organizations are investing a lot of efforts to deploy advanced network level security capabilities to do real prevention, all to avoid the heavy cost of the remediation process that usually takes place once the attack reaches the endpoint."

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-06
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service sc...
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.