Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 9 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

IT Lessons from iCloud: the increasing need for file-centric security

by The Gurus
September 10, 2020
in Opinions & Analysis
Share on FacebookShare on Twitter

I don’t need to tell you about the Apple iCloud hack: the lurid details have been exhaustively documented elsewhere.

However, I do want to tell you what your organisation should take away from it: it is critical to think about the security of your information at the file-level, rather than the device level.

Data-centric protection is critically important, particularly in business, and particularly for files – whether they are selfies or strategy PowerPoints. With the relentless growth of Dropbox and iCloud, the walls around the typical organisation have disappeared. The only solution is to build new walls around the data itself.

For a long time, information security groups like the Jericho Forum have worked to help organisations understand that their firewalls were no longer protecting their data in any meaningful way. As the iCloud attacks make abundantly clear, files are now moving between clouds and devices in both automated and manual ways, most of which involve exactly zero choke points for IT to control that data flow.

In the iCloud attack for instance, the prevailing theory is that celebrities’ iCloud accounts were compromised via what amounted to elaborate social engineering, and the backups of their personal photos were synced not to their own devices, but to devices belonging to the attackers.

 

This type of compromise is exceedingly difficult to defend against. An IT organisation considering the security of the files that nearly all its users work with will find few good options. Using mobile device management software to turn off iCloud may be an option, but that will push users (who are, after all, chiefly interested in getting their work done) into the arms of free or freemium file sync and share services.

The simple truth is that many businesses suffer from a false sense of security when it comes to popular box storage services. Right now employees are using these services to access sensitive company data without really being aware of the vulnerabilities inherent in these freemium services.

The content stored in them is only as secure as the people accessing it, with access controls disappearing the moment a user sync files to an unmanaged device or opens a file in a third party app. Additionally, these services create a lot of confusion around who owns what, especially when an employee leaves.
 
File sync and share technologies have evolved significantly as enterprises have begun using them en masse. The critical feature to ensure is that they can be safely used by organisa
tions with sensitive data to protect.

Keeping files encrypted until an authorised user authenticates to work with them, enabling organisations to control functions like sharing and printing, as well as establishing an audit trail of actions taken with the files on any authenticated device.

Additionally, these technologies (also known as information rights management, or IRM) enable organisations to revoke access to the sensitive files whenever they choose, leaving attackers, former employees, or disgruntled insiders in possession of a lump of encrypted data and not the corporate crown jewels, regardless of where the file has been copied, synced or sent.
 
Critically, though, IRM cannot be a hindrance to users if this is all to work as designed – there are simply too many workarounds in every app store. IRM must work across all devices (and the web) and technologies that use it must meet the twin challenges of making files both secure and usable everywhere they need to go in the course of a business workflow.

That means enabling work wherever you are and with whomever you are working: using any device suitable or available to read, or annotate a document; sharing work-in-progress with a few, and publishing authoritative content to the many; protecting intellectual property and sensitive information (whether at rest or in transit) on-premises, in the cloud, or on a device; satisfying the different needs of the casual user and the power user; being as useful on a mobile device as on a traditional computer; and working with line-of-business and collaboration systems that the business already owns, as well as those that it is thinking of getting.
 
Business efficacy, regulatory compliance, information security, and employee productivity are all affected by the way employees create, edit, process, and share documents, so the selection of enterprise file sync and share products is very much on the critical path of IT-related business investments.

Let’s face it: one of the key challenges facing CIOs and IT managers today is managing BYOD and how they try to regain control of enterprise content without impacting on productivity and creating mass user disenchantment.
 

Considering how digitally advanced we have become, we are still remarkably naïve about basic internet security. The most common techniques used by hackers have been the same for years: social engineering, phishing attacks, remote access tools (RATs) and password recovery and reset prompts. While these aren’t overly sophisticated methods, users fall victim to them time and again.

Enterprises need to make secure mobile and online practices a priority. They also need to consider a more file-centric security approach, especially if content is going to be accessed by employees from personal mobile devices or shared with external business partners.

Phishing attacks may be more sophisticated — poorly written emails from foreign princes giving away their fortunes are increasingly rare — but these attempts are still fairly obvious if you know what to watch for. Therefore frequent security training should also be a requirement to ensure employees know how to identify and avoid these ploys.

While most enterprises aren’t concerned that their own privacy will become fodder for public con
sumption in the way that celebrities’ selfies are, this should serve as a cautionary tale about consumer-based cloud services that every enterprise employee and employer should consider.

Ryan Kalember headshotlr
Ryan Kalember is chief product officer at WatchDox

FacebookTweetLinkedIn
Tags: attackCloudCompliance
ShareTweet
Previous Post

Open source monitoring firm reveals intrusion

Next Post

IBM unveils intelligent cloud security portfolio for global businesses

Recent News

Ransomware

Clop Ransomware Gang Extorts Household Names including BBC, British Airways and Boots

June 9, 2023
code

Developers Kept Away From Coding, Estimated £10.4bn a Year Wasted

June 8, 2023
large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information