How Attackers Exploit People to Circumvent Cyber... » LONDON, UK: Proofpoint, Inc. has released the results of its annual study that details the ways atta... Check Point and FireEye announce new partnership t... » San Francisco, CA: Check Point Software Technologies Ltd and FireEye have announced a partnership to... gateprotect offers companies high security encod... » Hamburg: gateprotect GmbH, a German IT security specialist and subsidiary of the Rohde & Schwarz cor... BeyondTrust Solution for Privileged Account Manage... » PHOENIX: BeyondTrust has announced that the company’s PowerBroker for Windows has been selected as a... The end of Goodluck and the beginning of the Buhar... » Against all odds, the 2015 Presidential election initially billed for February 14, but rescheduled t... Thales announces integration of nShield with Citr... » San Francisco, CA and Plantation, Fla.:  Thales has announce the integration of its nShield hardware... Thales wins with customer Qube Cinema 2015 InfoSec... » Thales has won the silver award for Best Deployment and Case Study in InfoSecurity Products Guide Gl... Wick Hill now shipping Barracuda Mobile Device Man... » Woking, Surrey: Wick Hill is now shipping Barracuda’s Mobile Device Manager (MDM) solution with supp... Databarracks recognised in Gartner's Magic Quadran... » London: Databarracks has been recognised in Gartner’s Magic Quadrant for Disaster Recovery as a Serv... Campaigners draw up battle lines to boost power... » Gate safety campaigners are once again mounting a high profile drive to raise awareness of the safet...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

London: Reacting reports that a US Federal Government contractor has modified the hardware of thousands of Apple iPads to allow government officials to `securely’ use their tablet computers, Varonis Systems says this illustrates the need to be able to work, access data and collaborate from anywhere on any device, as well as the need to protect information, and that it can be challenging to satisfy both.

 

David Gibson, Vice President of Strategy with data governance specialist Varonis, commented that the model of working in a 9-5 routine at a workstation in the office just isn’t the norm any more. Due to the consumerisation of IT people now use the device that they feel most appropriate to their work and lifestyle. These devices by themselves bring a lot of new freedom and capability, and with them concerns about security and management. It’s frightening to think how easily you could walk into work, take a picture of a sensitive memo, patient record, etc. and then forward it on undetected via a cellular network. Organizations now need to make sure that information stays where it is supposed to be, and at the same time provide a modern work and collaboration experience.

“While we don’t know the exact details of the alteration or the specific risks CACI is mitigating, the first thing that comes to mind is restricting the ability to disseminate sensitive information via cellular networks through forwarding or saving to a cloud service—this would hold true for digital content on or accessible by the device as well as anything the device could take a picture of—a prototype, rooms inside a building, blueprints or other documents. If the camera is eliminated, then the only way to get data onto the device is via the network or by manual entry. If the network is restricted to WiFi, then network access can be more easily controlled by the organization,” he said.

“In our major BYOD report of last summer (http://bit.ly/U9ETud) we found that two-thirds of senior managers either do not know where all their company data resides – or are not sure. My view is that, as the IT hardware landscape shifts to mobile devices connected to fast mobile networks – as has happened here – that percentage could easily rise without implementing additional controls to make sure that data is always stored where the organization can properly manage and protect it,” he added.