Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 10 May 2010

Securing the Mobile Workforce

Posted on 01:51 by Unknown

by Jon Fielding CISSP, Director, EMEA, IronKey

Don’t be fooled, just like a book; you can’t judge a USB device by its cover. So what should you judge it by?

You may think a USB device just transports data and you’d be almost right. There are those that transport data; there are those that transport data securely; and then there are those that transport data securely whilst also providing an array of additional features and functions. This article provides an overview of the areas to evaluate when looking to procure secure USB multi-function devices.

Q1. Who To Trust

Fundamentally the first decision to make is who to trust to provide an effective solution that protects your data. There are many companies that sell ‘secure’ USB multi-function devices however many are not security companies - where security is an add-on to their solutions. A security company, on the other hand, thinks security first and foremost and builds up from there. The question you need to ask yourself is which do you believe is in a position to protect your data the way it needs to be protected?

Q2. Management, Policy Enforcement, and Auditing

The ability to manage security, governance, and compliance gaps in a centralised way is critical to solving risk to the business. Expeditious risk identification assist security and operation’s teams can respond quickly, accurately and confidently if policies a broken. Reports must allow companies to take immediate action directly to perform tasks to resolve issues such as a lost or stolen device.

Q2. FIPS – what is it and why is it relevant

Federal Information Processing Standards (FIPS) is an independent third party endorsement with four levels of certification, “level 1” to “level 4”, with 1 being the lowest. However, while a useful tool in assessing the security of products, it is not a guarantee. You need to look not only at the level of certification gained, but also what it relates to. There have been instances recently where USB multi-function devices have had FIPS certification for one component within the device yet another part was found to be insecure. To be 100% certain every component of the device should have FIPS certification. After all a robust lock on your front door is worthless if the key is under the mat.

Q3. Malware Protection

Organisations have concentrated their malware prevention efforts on spam and web filtering so attacks are being launched through different channels. One prevalent example is the Conficker virus that has infected millions of PCs worldwide. Having first corrupted the ‘Autorun’ feature, it is commonly introduced when an infected device is plugged into a USB port, spreading the virus from within the heart of the enterprise. A correctly architected solution will mitigate against such an exploit by recognising and reacting to a corrupted auto run file, stopping the worm at source.

Q4. Spend A Little – Waste A Lot

Price is always a consideration however what may look like a cost-effective product today may deliver an expensive lesson tomorrow. For example, the Information Commissioner’s Office has been granted new powers to impose £500K penalties on organisations for serious data breaches. It has advised that its deliberations, when considering its punishment, will include whether all reasonable steps have been taken to prevent breaches occurring. Organisations need a solution that gives them the ability to manage and control their devices in the field, defining and enforcing policy; destroying those that go AWOL or are in the possession of someone who is no longer considered trustworthy; and providing auditable evidence for all these processes to satisfy the ICO.

Q5. Secure Today – Enable Tomorrow

You’re investing money in secure USB multi-function devices to transport data but these devices are also capable of serving as authentication tokens and can provide a platform for virtualisation – invaluable for remote workers especially as part of a disaster contingency plan.

Lost or stolen USB multi-function devices, containing everything from individuals private information to military secrets, have turned up practically everywhere — on the London Underground, in hire cars, at motorway services, at the side of the road, even in a bazaar in Afghanistan. Don’t add your data to the list.

For more information visit www.ironkey.com.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ▼  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ▼  May (13)
      • Security savvy professionals careless with busines...
      • Napatech to Demonstrate How To Build 10G IPS from ...
      • 3M launched new privacy filter at Infosecurity Eur...
      • Origin Data Locker 1TB – Product Review
      • Origin Storage’s 1TB Data Locker Has Arrived
      • Securing the Mobile Workforce
      • Atlassian password breach due to forgotten database
      • Are we facing yet another banking crisis?
      • Newly discovered flaw affects all recent Java vers...
      • Cloud computing and social networking leave UK bus...
      • Network performance at risk as bandwidth demand ou...
      • Trusteer Warns of Impending Wave of PDF malware at...
      • iStorage diskGenie – Product Review
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile