tandem_parachuting.jpg

Secure USB Fobs & Secure Transit...

Data loss, theft and control are key to society. They concern not only the reputations of the user, organisation or department but also the data might actually be about someone, or something important, sensitive or critical to a country's safety and wellbeing. It also embraces legal obligations over its content (and handling) and the reputation of the company, organisation or government can be at stake. The loss or theft might actually cause considerable distress or harm or enable the preparation of such...

Encryption products are widely available - but not widely used?

 ♦  Why, as many are really straightforward?
 ♦  Many organisations and corporate IT systems have the capabilities and often the products available?
 ♦  And still they don't get used 100% of the time when the data is at risk - Why?

A lot has to do with the psychology of being concerned about forgetting codes, passwords and risk of not getting the data back... some is simply to do with not valuing the possibility of theft, loss or risk - some, the organisation or department just doesn't do the risk analysis or won't put the budget and time investment in to solving the problem. Some is about doing what isn't allowed procedurally and if encryption products were asked for then the balloon would go up and stop the data going home or out of the office etc... Some is about doing the data mining or marketing analysis and processing the data raw! Some is down to the wrong user, corporate or departmental strategy with respect to data security - it is not a question of if it will happen it is more likely a question of when...

It is far better to assume someone at some time will either have stolen or lost very valuable or very sensitive data - it might even be in a very un-obvious way like do you crush all hard disks?... including the backups, complex switches, advanced printers and cache servers - personal laptops may need hard disk crushing for those moments when your staff do work on their own laptop/IT... What do you do with smart phones and tablets? What about email? Sometimes the loss/theft is circuitous and maybe your policies are robust but not the policies of those you subcontract the work to... Maybe you need to find out how many staff have email attachments going to smart phones and tablets - and what security (such as user authentication) is enabled! The Leveson Inquiry is showing us all the damages and costs of not resetting (or setting) default pins/pass codes on voice mail, answerphone and mobile phone voice mails... 

Either way - it is far better to get the right risk management strategies in place, get the right approach to segmented key data... and enable all to use encrypted products more freely...

 ◊  How many laptop losses/thefts have you heard about?
 ◊  How many CDs lost with potentially no encryption of data?
 ◊  How many USB fobs lost with horrendous levels of sensitive data?

Too many should be your answer. Some thankfully were encrypted - and the products available are strong. Encryption is in many senses a key aspect - but it isn't the total answer - process, training, attitude and responsible risk management are all key to getting this right... SOPHOS has several key products that allow you to enforce a discipline about downloading to CDs and USB fobs - even stopping it from those clients that shouldn't.

We are finalising to become a major supplier of encrypted USB drives for end-users - to drive up their use in authenticated access. To also drive forward the use of tokens based on biomedical authentication combined with other tokens such as pins and/or passwords - and network-level access from a server/client (or network access into a server/client) demanding and reliant on such multifaceted authentication. If such is only ever code and algorithms - without simplifying the points too much - both can be stolen, potentially hacked or duped (e.g. man in middle attack) - what we all need is much stronger cost-effective approaches to protect valuable data and assets.

We have chosen a supplier that has products that can encode up to ten fingerprints and encrypt the data using a powerful AES algorithm - there is even a completely integrated version that is designed to help you give presentations - so you can encrypt that valuable corporate or government data, go give your presentation and feel secure that your (or your organisations/departments) data isn't compromised nor can it be in the hotel or in transit.

We are not going to stop at the USB - we are looking at secure login and authentication too. Extremely secure firewalls and network designs will be on offer - using strong products that offer Unified Threat Management [UTM] capabilities... It is critical to understand the threats to your infrastructure and exactly how it is being used by your customers, suppliers and staff [temporary, new, existing, leavers, dismissals and retired]. Technology is becoming widely used in the business that are personal items that are not part of the corporate governance nor security programme, tools and techniques - yet that might be a key enabler to an efficient workforce - it may also be your key risk areas or even legal problems...

But then a very strong infrastructure and firewalling moves your threat and risks potentially to in-transit threats - so we have also chosen a supplier to offer products that are secure document carriers with anti-slash, secure laptop, tablet and document protection for transit and overnight in hotels - more on that later.

Still even that isn't good enough with RFID-enabled tokens in credit/debit cards and corporate ID - so we have also chosen a supplier to offer products that can protect passing capture of such on the move and hence thwart security risks such as identity theft or secure access token sequence number theft.

Considerably more will follow shortly.... 

iStorage Secure USB Datasheet download PDF

Securing your Data, Identity and Documents - at AREA17 we know what is at stake...