Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 30 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

The Implicit Risks of Pokémon GO to Enterprises

by The Gurus
August 3, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

The global hype around Nintendo’s new game, Pokémon GO, is unprecedented. But apart from being a fun attraction, it also carries with it an array of implicit risks to any organisation.
The first risk is that of the fake Pokémon GO apps, which was already identified by ESET and ProofPoint in the last few days. This risk can be mitigated by forbidding ‘side installations’ of applications that didn’t originate from the official application stores of Apple and Google, and through monitoring and identifying the existence of those fake apps on connected devices.
The second security risk is less intuitive and commonly overlooked. It is a risk inherent with every augmented reality game or application: the “Unintentional Shoulder Surfing”.
Wikipedia defines Shoulder Surfing as “using direct observation techniques, such as looking over someone’s shoulder, to get information”. Part of the thrill of the new Pokémon GO application is taking pictures of spotted Pokémons and sharing them with your social circles, such as in the following image:
Untitled1
Or in this image that was posted on a recent VentureBeat blog post:
Untitled2
Without being aware of it, proprietary software code, financial data, personal information and other sensitive data may be exposed and compromised through what seems to be a naïve, fun and social activity.

How to Block Pokémon Go at the Office

To mitigate this risk, organisations that care about their data are strongly advised to block the use of Pokémon GO in their office spaces and raise awareness by explaining the risks to employees.
Blocking Pokémon GO in the office can be achieved by using an application-aware firewall (e.g. NGFW) where a rule to block the Pokémon GO application traffic can be set.
Multi-site organisations that manage their security using on-premise NGFW appliances will need first to have their local application database updated (once Pokémon GO signatures are available from their FW vendor), and later define the blocking rule for each site of their organisation.
Multi-site organisations who have already transitioned to use Firewall-as-a-service, will only need to specify one blocking rule in only one administration application. This new security policy will be immediately enforced on traffic from all their sites and users.
Moving the perimeter to the cloud, enables organisations to push new security policy quickly, and to enforce it on any network, users, and devices – on the corporate network, or off.
As with all security risks, technological capabilities must be augmented with employee awareness of the potential risks associated with the game to mitigate them and prevent potential data loss.
 
 
Ofir Agasi is Director of Product Marketing at Cato Networks with over 12 years of network security expertise in systems engineering, product management, and research and development. Prior to Cato Networks, Ofir was a product manager at Check Point Software Technologies, where he led mobile security, cloud security, remote access and data protection product lines. Ofir holds a B.Sc. degree in Communication Systems Engineering.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

123-Reg drowns in ongoing DDoS tsunami

Next Post

Ransomware numbers and ransom demands are on the rise, with corporations increasingly coming into the line of fire.

Recent News

cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information