Freedom from security

April 2005 Information Security

Ian Schenkel, MD of Sygate EMEA, illustrates the security headaches that organisations face in the battle to enable mobile working, and puts forward a remedy that will ensure the integrity of corporate devices and the corporate network.

Enterprises are no longer restricted to the networked systems bounded by the building in which the company is housed. Modern enterprises span the globe and employees can easily access the corporate network from outside the office, opening many more productivity channels. The proliferation of broadband has enabled home working to become an economically viable option while the dramatic fall in the price of laptops allied with the explosion in WiFi technology has made mobile working the norm for many companies.

Recent figures from the UK Labour Force Survey have revealed that over 25% of the UK workforce have taken advantage of the capability to work at home, and Datamonitor recently suggested that 2005 will see 40 million Europeans working from home with the UK leading the trend with 8,3 million home workers. The percentage of the UK workforce regularly using mobile devices such as laptops will undoubtedly dwarf this number, as organisations capitalise on the business benefits that mobile working provides. However, with this liberation comes an associated security risk.

The ability for a company to enforce corporate security policy diminishes severely once a computer is used outside of the office. For example, if a worker takes a company laptop for a week, who is responsible for ensuring that corporate security policy is followed when the machine is being used? It is very rare to find an employee who knows what the company security policy is, not to mention understands what the implications might be if it is not followed. So who is going to warn the worker when they forget to upload a critical patch, or decide to disable the anti-virus from time to time, or use an unauthorised instant messaging application, or load games and songs? Who is going to be able to stop the employee's children from using the laptop to trade files over peer-to-peer software?

The answer, of course, is no one. The user will likely be unaware of the many security threats that are out there, such as spyware, Trojan horses, viruses and worms. They will also be blissfully ignorant of the fact that the next time the device connects to the corporate network the security threat will be passed on to the company.

The cost of network security failure cannot be ignored. Cybercrime cost UK businesses hundreds of millions of pounds in downtime, remediation costs and lost business last year. For example, the Sasser worm that was unleashed at the end of April last year crashed hundreds of thousands of computers worldwide after rapidly spreading over the Internet. Sasser did not require users to receive an e-mail message or open a file to be infected. Instead, just having a vulnerable Windows machine connected to the Internet was enough to get infected.

Most organisations understand that there are numerous security threats in the wild and have developed and written security policies in an attempt to preserve the integrity of their network, but how many are actually able to enforce the policy? If most employees are unaware of what the company security policy is, let alone understand how to enforce it, then there should be an alternative method of enforcing policy where the 'security thinking' is not the responsibility of each and every worker.

What is vital then is that there is a mechanism in place that prevents vulnerable machines from passing any threat on to the rest of the network. A mechanism that ensures the security policy does its job and that only devices in a trusted state are allowed to connect with the corporate network. Technology is now available that can do just this - 'insist' on the full integrity of any machine before it is allowed to connect to the network. No matter where a device is physically or how it is connected, if its security levels are not compliant with those set out in the security policy then it will be quarantined outside the network until it has automatically been brought up to the required level of protection. This keeps individual machines and the corporate network fully compliant at all times, ensuring that as long as the security policy is watertight, so is the network.

By taking responsibility away from the user and automating the enforcement of security policy, the CIO is provided with the peace of mind that policy is being implemented and maintained on every single machine and employees benefit by being able to focus more closely on their work without having to concern themselves with security matters. In this way full compliance is achieved across all users and a corporate security policy can be truly effective.

For more information, please visit www.sygate.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New ransomware using BitLocker to encrypt data
Technews Publishing Information Security Residential Estate (Industry)
Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. It can detect specific Windows versions and enable BitLocker according to those versions.

Read more...
Create order from chaos
Information Security
The task of managing and interpreting vast amounts of data is akin to finding a needle in a haystack. Cyberthreats are growing in complexity and frequency, demanding sophisticated solutions that not only detect, but also prevent, malicious activities effectively.

Read more...
Trend Micro launches first security solutions for consumer AI PCs
Information Security News & Events
Trend Micro unveiled its first consumer security solutions tailored to safeguard against emerging threats in the era of AI PCs. Trend will bring these advanced capabilities to consumers in late 2024.

Read more...
Kaspersky finds 24 vulnerabilities in biometric access systems
Technews Publishing Information Security
Customers urged to update firmware. Kaspersky has identified numerous flaws in the hybrid biometric terminal produced by international manufacturer ZKTeco, allowing a nefarious actor to bypass the verification process and gain unauthorised access.

Read more...
Responsible AI boosts software security
Information Security
While the prevalence of high-severity security flaws in applications has dropped slightly in recent years, the risks posed by software vulnerabilities remain high, and remediating these vulnerabilities could hinder new application development.

Read more...
AI and ransomware: cutting through the hype
AI & Data Analytics Information Security
It might be the great paradox of 2024: artificial intelligence (AI). Everyone is bored of hearing it, but we cannot stop talking about it. It is not going away, so we had better get used to it.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...
A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...