SlideShare une entreprise Scribd logo
1  sur  4
06350<br />Protecting Intellectual Property in the <br />Age of WikiLeaks<br />By Steve Vinsik<br />Steve Vinsik is vice president, Critical Infrastructure Protection (CIP), with responsibility for strategic leadership, practice development, and service delivery.  Steve has more than 15 years’ experience leading field operations teams that conduct research and development, application development, integration and information security programs – spanning biometric and surveillance technology integration,  security architecture, physical and logical security convergence and information systems domains.  The CIP practice supports numerous clients in the Government, Transportation, and Financial Services sectors globally.<br />WikiLeaks stands as a warning for all of us responsible for protecting the digital assets and intellectual property (IP) of our organizations.<br />It is tempting to think that WikiLeaks, and the explosion of similar whistleblower and vigilante sites, as only interested in information from government, military, or political organizations. But a recent Forbes interview with WikiLeaks founder Julian Assange has a warning for us all.<br />Assange told Forbes that his organization has document stashes from major pharmaceutical, financial, and technology companies, and that the number of internal documents being leaked to WikiLeaks is exploding exponentially.<br />The handwriting is on the wall. Corporate America can no longer regard leaks as occasional aberrations happening to a handful of unfortunate government targets. We live in an age of consumerization, where mission-critical systems are increasingly accessible to anyone with a web-savvy device and a logon; where consumer apps are regularly processing enterprise data.<br />It’s now possible for any disgruntled employee to digitize or download sensitive documents using nothing more than a smartphone, tablet, or thumb drive. Likewise, they can digitally record phone calls and meetings surreptitiously. And they can photograph or videotape facilities, security procedures and even logon sequences using easily concealed consumer devices.<br />What they steal they can publish worldwide, anonymously, with ease and speed. It takes just minutes to marshal a blog, microblog, social network, or wiki to organize, publish, share, and promote purloined information. A few years ago, this type of data extraction, transformation, and loading was the domain of data warehousing and knowledge management experts. Now anyone with an axe to grind, access to corporate assets, and consumer technology can do it.<br />The threat is not exclusively from employees, activists, or competitors. As a recent article in The Philadelphia Inquirer pointed out, consumers — your customers — are using smart devices and social media to conduct and publish surveillance on the organizations they deal with.<br />The likelihood that your organization will fall victim to these activities rises by the day. What is happening with WikiLeaks and similar crowdsourced services is a perfect storm of poor (read: obsolete) security policies colliding with the consumerized enterprise. Recognizing this risk, there are specific actions that your organization can take today to secure its IP. <br />These include:<br />Recognizing that the threat is internal as well as external<br />Extending your endpoint security to the consumer technology devices being used in your organization or otherwise connecting to your organization<br />Ensuring your security policies keep pace with consumer technology<br />A Broader Threat Profile<br />Let’s consider each of these bullet points individually, starting with the threat itself. We spend a lot of time and effort protecting our organizations from outside threats, but the source of the material posted on WikiLeaks was an insider — a private first class with authorized access to the information (though certainly not the authorization to download it and publish it).<br />We need to realize that the trusted insider is as legitimate a threat as the untrusted outsider. Insiders have the access and opportunity to find and use proprietary information that could do real damage when placed in the wrong hands.<br />Obviously, employees need access to information to do their jobs. But we often give them access to a lot more data than they really need, and we often fail to review that access and update it accordingly over time. We must expand our focus in security beyond simple data protection, data security, and identity management.<br />It is no longer sufficient to simply authenticate that users are who they say they are. We also need to know exactly what information they should have access to as part of their job responsibilities. And we need to know what they are doing with that information, and where they are doing it.<br />This starts by adopting the notion that data is in a hostile or unknown environment even when inside our own firewall on our own internal network. We have to be able to protect that data at all times. From an enterprise perspective, we need to secure data while it is at rest, in motion, and in use.<br />As an example, there is a wealth of general information about the U.S. government to be found on the Internet as well as floating around internally throughout the government. All of it seems innocuous in and of itself. But it’s been said that an antagonist could piece all that information together, and suddenly gain a fuller picture of what could be classified information.<br />Businesses have this same problem. There might be a lot of sales, marketing, opportunity, portfolio, or strategy documents that, on their own, might be fine to disseminate to an organization internally or externally.<br />But anyone with an agenda could snoop around using the organization’s social and enterprise collaboration tools, its website, its various public feeds (Twitter, LinkedIn, job boards and postings, etc.) and start piecing together a bigger picture. Soon they might be able to connect the dots of a strategic plan that should be closely held and well secured.<br />Extending Endpoint Security to Consumer Devices<br />What can be done in an era when a tiny thumb drive or smartphone can be used to bring a secure network to its knees? Clearly we need to extend security to cover the new consumer devices of today and those to come.<br />The first step with smartphones is to authenticate that the user is who he says he is. With mobile devices, identity management is a bit more difficult. You can’t necessarily use a smart card to allow an on-site or remote employee to swipe an ID card and connect securely.<br />That said, we can implement policies that extend to these devices. We can put a digital certificate on them, so we know the smartphone is a trusted device that’s permitted to connect to our network and get e-mail, for example, or browse certain network shares.<br />We might have additional layers of security as well. We can have a policy that requires a complex password or touch-screen gesture to access the device. We can require the device to automatically lock itself and require the user to re-authenticate after some period of time or inactivity. And we can enforce these policies for any device that connects to our networks, even if the devices are owned by the employee.<br />Biometrics is becoming an option for smartphones, tablets, netbooks, and laptops that have integrated cameras and microphones (and today, most new devices do). First and foremost, requiring the capture of a digital photo at logon can associate a face with the transaction. And the built-in audio/video capabilities of mobile computing devices are getting so good that companies can start considering using them for face, image, and voice authentication.<br />When dealing with smartphones and tablets specifically, organizations can use integrated GPS and other location services to control what information can be disseminated to users. Consider an attempt to access a confidential report via an iPhone. The request originates from a location that, according to the user’s access profile, is not on a list of approved locations or does not otherwise fit the user’s movement pattern.<br />The request is therefore suspect. Maybe it’s not really the employee or the employee’s device. Or perhaps the device was lost or stolen. It could easily be someone else trying to impersonate the employee to access the information. Since the request originates outside the scope of the employee’s authorized locations, the request can be denied, or additional authentication measures can be required (i.e., multi-factor authentication).<br />Let’s take it a step further. Suppose we’re in a company facility that has tight digital rights management on its data to prevent unauthorized printing, e-mailing, or downloading of documents. The loophole: The employee’s mobile phone or tablet has a high-resolution camera on it. It’s a simple matter to snap photos of documents or screens and neutralize the DRM protections.<br />But what if the facility has a location-based policy and supporting technology in effect? A policy that uses location-based services will disable the camera on any device the moment anyone enters the facility. When they leave the building the camera will function normally. The process is invisible and unobtrusive to the user, and closes one of the bigger security loopholes evident in most organizations today.<br />Yet another use of location-based policy might be to allow employees to view and edit documents on their screen while they are within a secure facility, but prohibit that data from being stored locally, and deny access entirely when they are not within the building.<br />An analogous approach is to look for changes in an employee’s usage patterns. There are quite a number of tools becoming available that can analyze employees’ work patterns — what files they access, how many e-mails they send, what kind of attachments they send, who they communicate with, what internal and external resources they access, where they work, and so on.<br />When an anomaly is detected, the security team could be alerted to the anomalous behavior, and check to ensure that it was a legitimate business activity. Maybe it’s legitimate, and the employee is simply working with a new team in a different part of the building, and must work with people and documents they didn’t need to before. Or maybe they’re downloading a few gigabytes of secret diplomatic cables.<br />Keeping Pace with Changing Threat Profiles<br />The pace of change in consumer technology is breathtaking. Security policies need to keep up. If they don’t, there is only one outcome: The organization will be vulnerable. This is the most important rule to bear in mind.<br />The trouble is, most organizations will do the absolute minimum to meet compliance requirements. With financial institutions, they often build into their financial model the level of fraud that is acceptable for them to still make a profit. They only begin looking at security solutions when the fraud threatens their ability to make money. Sadly, they’re not alone in this mentality.<br />WikiLeaks has changed the equation by increasing the potential damage and the risk of IP theft. The consumerization of devices and applications is driving a new and evolving threat profile — one that demands unceasing diligence and evolution of policy, and the technology required to support it.<br />For more information visit www.unisys.com ©2011 Unisys Corporation. All rights reserved. Specifications are subject to change without notice. Unisys and the Unisys logo are registered trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Printed in the United States of America 01/11 <br />
Protecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaks

Contenu connexe

Tendances

Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuart Millar
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFTPrint - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFTGerry Skipwith
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 

Tendances (19)

Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFTPrint - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 

Similaire à Protecting Intellectual Property in the Age of WikiLeaks

Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfkostikjaylonshaewe47
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalistsantoniokisembo
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015Jörn Weber
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 

Similaire à Protecting Intellectual Property in the Age of WikiLeaks (20)

IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 

Protecting Intellectual Property in the Age of WikiLeaks

  • 1. 06350<br />Protecting Intellectual Property in the <br />Age of WikiLeaks<br />By Steve Vinsik<br />Steve Vinsik is vice president, Critical Infrastructure Protection (CIP), with responsibility for strategic leadership, practice development, and service delivery.  Steve has more than 15 years’ experience leading field operations teams that conduct research and development, application development, integration and information security programs – spanning biometric and surveillance technology integration,  security architecture, physical and logical security convergence and information systems domains.  The CIP practice supports numerous clients in the Government, Transportation, and Financial Services sectors globally.<br />WikiLeaks stands as a warning for all of us responsible for protecting the digital assets and intellectual property (IP) of our organizations.<br />It is tempting to think that WikiLeaks, and the explosion of similar whistleblower and vigilante sites, as only interested in information from government, military, or political organizations. But a recent Forbes interview with WikiLeaks founder Julian Assange has a warning for us all.<br />Assange told Forbes that his organization has document stashes from major pharmaceutical, financial, and technology companies, and that the number of internal documents being leaked to WikiLeaks is exploding exponentially.<br />The handwriting is on the wall. Corporate America can no longer regard leaks as occasional aberrations happening to a handful of unfortunate government targets. We live in an age of consumerization, where mission-critical systems are increasingly accessible to anyone with a web-savvy device and a logon; where consumer apps are regularly processing enterprise data.<br />It’s now possible for any disgruntled employee to digitize or download sensitive documents using nothing more than a smartphone, tablet, or thumb drive. Likewise, they can digitally record phone calls and meetings surreptitiously. And they can photograph or videotape facilities, security procedures and even logon sequences using easily concealed consumer devices.<br />What they steal they can publish worldwide, anonymously, with ease and speed. It takes just minutes to marshal a blog, microblog, social network, or wiki to organize, publish, share, and promote purloined information. A few years ago, this type of data extraction, transformation, and loading was the domain of data warehousing and knowledge management experts. Now anyone with an axe to grind, access to corporate assets, and consumer technology can do it.<br />The threat is not exclusively from employees, activists, or competitors. As a recent article in The Philadelphia Inquirer pointed out, consumers — your customers — are using smart devices and social media to conduct and publish surveillance on the organizations they deal with.<br />The likelihood that your organization will fall victim to these activities rises by the day. What is happening with WikiLeaks and similar crowdsourced services is a perfect storm of poor (read: obsolete) security policies colliding with the consumerized enterprise. Recognizing this risk, there are specific actions that your organization can take today to secure its IP. <br />These include:<br />Recognizing that the threat is internal as well as external<br />Extending your endpoint security to the consumer technology devices being used in your organization or otherwise connecting to your organization<br />Ensuring your security policies keep pace with consumer technology<br />A Broader Threat Profile<br />Let’s consider each of these bullet points individually, starting with the threat itself. We spend a lot of time and effort protecting our organizations from outside threats, but the source of the material posted on WikiLeaks was an insider — a private first class with authorized access to the information (though certainly not the authorization to download it and publish it).<br />We need to realize that the trusted insider is as legitimate a threat as the untrusted outsider. Insiders have the access and opportunity to find and use proprietary information that could do real damage when placed in the wrong hands.<br />Obviously, employees need access to information to do their jobs. But we often give them access to a lot more data than they really need, and we often fail to review that access and update it accordingly over time. We must expand our focus in security beyond simple data protection, data security, and identity management.<br />It is no longer sufficient to simply authenticate that users are who they say they are. We also need to know exactly what information they should have access to as part of their job responsibilities. And we need to know what they are doing with that information, and where they are doing it.<br />This starts by adopting the notion that data is in a hostile or unknown environment even when inside our own firewall on our own internal network. We have to be able to protect that data at all times. From an enterprise perspective, we need to secure data while it is at rest, in motion, and in use.<br />As an example, there is a wealth of general information about the U.S. government to be found on the Internet as well as floating around internally throughout the government. All of it seems innocuous in and of itself. But it’s been said that an antagonist could piece all that information together, and suddenly gain a fuller picture of what could be classified information.<br />Businesses have this same problem. There might be a lot of sales, marketing, opportunity, portfolio, or strategy documents that, on their own, might be fine to disseminate to an organization internally or externally.<br />But anyone with an agenda could snoop around using the organization’s social and enterprise collaboration tools, its website, its various public feeds (Twitter, LinkedIn, job boards and postings, etc.) and start piecing together a bigger picture. Soon they might be able to connect the dots of a strategic plan that should be closely held and well secured.<br />Extending Endpoint Security to Consumer Devices<br />What can be done in an era when a tiny thumb drive or smartphone can be used to bring a secure network to its knees? Clearly we need to extend security to cover the new consumer devices of today and those to come.<br />The first step with smartphones is to authenticate that the user is who he says he is. With mobile devices, identity management is a bit more difficult. You can’t necessarily use a smart card to allow an on-site or remote employee to swipe an ID card and connect securely.<br />That said, we can implement policies that extend to these devices. We can put a digital certificate on them, so we know the smartphone is a trusted device that’s permitted to connect to our network and get e-mail, for example, or browse certain network shares.<br />We might have additional layers of security as well. We can have a policy that requires a complex password or touch-screen gesture to access the device. We can require the device to automatically lock itself and require the user to re-authenticate after some period of time or inactivity. And we can enforce these policies for any device that connects to our networks, even if the devices are owned by the employee.<br />Biometrics is becoming an option for smartphones, tablets, netbooks, and laptops that have integrated cameras and microphones (and today, most new devices do). First and foremost, requiring the capture of a digital photo at logon can associate a face with the transaction. And the built-in audio/video capabilities of mobile computing devices are getting so good that companies can start considering using them for face, image, and voice authentication.<br />When dealing with smartphones and tablets specifically, organizations can use integrated GPS and other location services to control what information can be disseminated to users. Consider an attempt to access a confidential report via an iPhone. The request originates from a location that, according to the user’s access profile, is not on a list of approved locations or does not otherwise fit the user’s movement pattern.<br />The request is therefore suspect. Maybe it’s not really the employee or the employee’s device. Or perhaps the device was lost or stolen. It could easily be someone else trying to impersonate the employee to access the information. Since the request originates outside the scope of the employee’s authorized locations, the request can be denied, or additional authentication measures can be required (i.e., multi-factor authentication).<br />Let’s take it a step further. Suppose we’re in a company facility that has tight digital rights management on its data to prevent unauthorized printing, e-mailing, or downloading of documents. The loophole: The employee’s mobile phone or tablet has a high-resolution camera on it. It’s a simple matter to snap photos of documents or screens and neutralize the DRM protections.<br />But what if the facility has a location-based policy and supporting technology in effect? A policy that uses location-based services will disable the camera on any device the moment anyone enters the facility. When they leave the building the camera will function normally. The process is invisible and unobtrusive to the user, and closes one of the bigger security loopholes evident in most organizations today.<br />Yet another use of location-based policy might be to allow employees to view and edit documents on their screen while they are within a secure facility, but prohibit that data from being stored locally, and deny access entirely when they are not within the building.<br />An analogous approach is to look for changes in an employee’s usage patterns. There are quite a number of tools becoming available that can analyze employees’ work patterns — what files they access, how many e-mails they send, what kind of attachments they send, who they communicate with, what internal and external resources they access, where they work, and so on.<br />When an anomaly is detected, the security team could be alerted to the anomalous behavior, and check to ensure that it was a legitimate business activity. Maybe it’s legitimate, and the employee is simply working with a new team in a different part of the building, and must work with people and documents they didn’t need to before. Or maybe they’re downloading a few gigabytes of secret diplomatic cables.<br />Keeping Pace with Changing Threat Profiles<br />The pace of change in consumer technology is breathtaking. Security policies need to keep up. If they don’t, there is only one outcome: The organization will be vulnerable. This is the most important rule to bear in mind.<br />The trouble is, most organizations will do the absolute minimum to meet compliance requirements. With financial institutions, they often build into their financial model the level of fraud that is acceptable for them to still make a profit. They only begin looking at security solutions when the fraud threatens their ability to make money. Sadly, they’re not alone in this mentality.<br />WikiLeaks has changed the equation by increasing the potential damage and the risk of IP theft. The consumerization of devices and applications is driving a new and evolving threat profile — one that demands unceasing diligence and evolution of policy, and the technology required to support it.<br />For more information visit www.unisys.com ©2011 Unisys Corporation. All rights reserved. Specifications are subject to change without notice. Unisys and the Unisys logo are registered trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Printed in the United States of America 01/11 <br />