Data loss prevention (DLP) is an emerging field with a lot of different products and players. The idea is to stop information from leaving your internal networks in close to real time, so you can identify the leaker or thief before too much damage (and ensuring lawsuits) happen. I look more closely at three different DLP products from BlueCoat, Global Velocity, and Sendmail to show you what is involved in setting these up in a story today posted on ITworld.
Category Archives: security
SearchEnterpriseDesktop: Controlling Facebook apps across the enterprise
Controlling employee use of social networking sites is becoming more of a challenge for IT managers. According to Facebook, at any given moment, about 30 million people are playing Farmville and other games across its network. Earlier this year, an Army grunt posted the location of his next mission in Afghanistan on his Facebook status page, and within moments, the mission was scrubbed and the soldier was being sent back home. Several products and strategies can help you control enterprise apps and I review a variety of approaches in my story for Techtarget here.
Time to update your Facebook and LinkedIn privacy settings
With the news last week about Facebook Places (which is not universally available in all locations, and only on certain phones), it is time to take a closer look at your privacy settings for Facebook. While you are at it, you might as well look at the same for your LinkedIn account. Be prepared to spend a quiet hour or so debating the myriad of choices on both services.
Both of them have a long ways to go to make them simpler, and reek of a user interface that has awkwardly grown like topsy since they were started. And there is no guarantee that this guide will be relevant even next week, because they are constantly changing the options.
Let’s look first at Facebook. If you go into your Account/Privacy Settings, you have a main screen that shows you a grid, which right off the bat is confusing enough. There are options for four basic categories of contacts: Everyone, Friends of Friends, Friends Only, or “Other”. The other axis is different types of content, including your personal information such as your birthday (and I don’t recommend that people list their full real birthdays on Facebook for identity theft reasons), status updates, photos etc.
Facebook has its own recommended settings for this grid, or you can create your own customized privacy settings. I recommend you choose this latter route. You will see three groups of items: things that you share to others, things that others share with you, and contact info.
There are a couple of landmines in terms of privacy here. I recommend that you only share things with your friends, with the possible exception of your Websites and posts. If you are going to use Places, there is an entry at the bottom of this list that asks “Include me in ‘People Here how’ after I check in. This will let people know you’re at a particular location if people go to the Facebook page of that location or if they do a search for people near your location.
The more troubling setting is under the things that others share grouping. Think these through because this is where you can get into trouble. Do you really want to be tagged in all photos that friends post of you online? If you are a college student about to apply for your first job, maybe not. Do you want everyone to see your wall posts, even outside your network? Ditto. And the last option, “Friends can check me into Places” you should set to disable. If you enable this option, any friend could potentially check you in anywhere. You don’t actually have to be present to win, which could have unseen consequences.
Now let’s go over to LinkedIn’s settings. You will have to visit eight different screens to configure this, which again is more complicated than it should be. Some of these are simple binary yes/no choices: You can opt out of research surveys being sent your way, seeing ads, being part of their service provider directory, and whether you want to view other people’s profile photos. But a couple of these are important. Since the beginning, LinkedIn has the choice whether you want others to view your contacts information or not, what they list under the “Connections Browse” screen. I keep going back and forth on this one, but right now I have it set to no. Regardless of which you choose, your connections can still see if they share a connection with you when they search.
Another screen worth taking a closer look at is your Authorized Applications list. LinkedIn has been busy adding third-party applications (although they could be busier, if you asked me) and you may not realize how many of them can now connect to your account. Examples include automatic posting of WordPress or Typepad blog entries on your LinkedIn status page, showing your presentations in your Slideshare.net account, travel plans on Tripit, and others. If you want to add any of these applications, you have to edit your profile and hunt down the button for applications. It could be easier, which is probably why many of you don’t even know about this feature. I like the LinkedIn apps because they enable me to associate a lot of content with my profile, such as the slide decks for my speeches, where and when I am on the road, and so forth. Facebook has its own separate page to control what stuff their own apps have access to.
Finally, in a separate area are Twitter settings, where you can link the two services together and control what tweets get posted to your LinkedIn status update. Once you link them, you can share particular tweets with a special #in hashtag or share them all.
There are a lot more things to think about, including what information gets sent to your network when you add content to both services. This is why I recommend taking a chunk of time when you can think through the implications and make sure you have it all setup the way you want. Unfortunately, it should be easier than it is for configuring both services. Good luck and do share your own tips on my Strominator blog, or posting them on my Facebook page.
ITworld: How to safely access your secure desktop without your laptop
If you travel frequently, there will be times when you don’t want to lug your laptop along. Whether you find yourself at a local cybercafé or library, or have to sit down temporarily at a colleague’s computer, you need a secure and simple way to get online and get your work done. There are a few solutions that require a bit of pre-planning before you leave for your trip, but aren’t onerous, costly or complex.
You can read the article in ITworld on how to safely leave home without your laptop here.
The golden era of geo-stalking
What do a DC drug dealer and a TV show host have in common? The ease at which they both can be tracked by GPS devices without their knowledge. Through a combination of Web technologies and cheaper, more ubiquitous devices, we are now witnessing what could be the golden era of geo-stalking. It is both thrilling and scary at the same time.
Last week, a man arrested for drug possession was set free in DC because the police put a GPS on his car to track his movements. The courts ruled that without a search warrant and without the person’s knowledge that he was being tracked, the arrest couldn’t stand.
Then there was the case of the host of the TV show Mythbusters who was tracked by virtue of information that he posted of a photo of his car. Because he took the photo in front of his house, and because the photo contained geo-tagging information, an enterprising reporter could piece together where the host lived, and bring up an actual picture of the host’s home on Google Maps.
Certainly, having a GPS inside your phone is convenient. No longer can men claim that they know where they are going when their wives can pull up a screen and give them turn-by-turn directions. Another click, and you can find the nearest drugstore or burger joint when in a strange town, or even a not-so-strange one. It amazes me how far we have come and how much and who you can track these days.
Earlier this year, I wrote about location-aware services like Foursquare and Loopt that are used for social networking purposes. But there are a couple of other services that I have been looking at since then that I want to mention.
I have been trying out an iPhone app called Life360 that can be used to connect with family members. You load it up on your phone and connect to your other family members. If you are running iOS v3, as long as you bring up the app to update your position it will let everyone else know where you are. This is its biggest weakness, because you need to bring up the app so your location can be tagged. (It will run in the background on iOS v4 phones, but everyone of your connections then needs to upgrade their phone accordingly.) It also disturbingly posts locations of known nearby sex offenders.
And if you have purchased a Garmin GPS, there is a site that works with these devices called Connect. Your GPS is set up by default to transmit your movements, and the Connect can be used to assemble a map of your regular workout routines if you jog or bike with the device on your person. The trouble is that you can quickly find others movements as well. I found several organized bike rides in my neighborhood, along with someone named Hannah’s running schedule, and lots more.
The iPhone’s default geo-privacy setting is “ask upon first use.” This means that when you run a new app for the first time, it asks you for permission when it wants to access your position. That might not be granular enough, and while it is essential for apps such as Foursquare, I am not so sanguine about publishing any of my photos with the geotags. There is a way to reset this setting, and the aptly named site icanstalku.com will show you how to do this for both iPhone and Androids.
And for the Garmin devices, you should change the privacy settings if this bothers you.
Expect a lot more geo-stalking to happen in the near future. And while it is amazing what you can do with a GPS these days, part of me longs for those bygone days when all you could do with cell phones was dial 10 digits.
Facebook/Livejournal scam
I have been getting dozens of Facebook “friend” requests over the past week. It isn’t because I have suddenly become popular, much as I might wish.
These requests all have several things in common:
- All are from women, with a picture (usually safe for work)
- None of these people have anyone in common with my existing FB network of friends
- All of them have just a single post on their wall, which looks like the above picture
- All of the posts lead to a Livejournal blog site, with a different name than the name of the owner of the FB account
- All of these lead to a final destination site that tries to get you to sign up for a “free” iPhone which I won’t bother to list here.
Needless to say, this is an annoying scam. So beware of whom you befriend. I guess they are trawling for victims.
Attention stalkers: Garmin’s Connect now broadcasting your locations
If you have purchased a portable Garmin device with a built-in GPS, you might want to take a moment and change one of its critical settings, if you value your privacy. To get an idea of what is possible, go to
http://connect.garmin.com/explore
This is the map-based activity finder for several Garmin sports equipment users. To take a closer look, enter your zip code at the top and that should bring up a map with different people’s activity over the past few days. Red for bikers, blue for runners, etc. You can scan history, and in my own explorations I found several organized bike rides along with a woman named Hannah’s running schedule, and more. It is very scary. Why?
Because with a tiny amount of digging you can go online, find out if there is anyone in your area who runs or bikes, when they go, where they go, where they live, and even what expensive training equipment they’re wearing. All of this information is made available because the default security setting is “public.”
I asked Garmin’s PR about this and they stated that they have informed their customers about this. But why not just make the default setting private?
Those of you that use these devices should take a moment now and set them to private if you don’t want this information available to just anyone.
How to control corporate Facebook access
In keeping with my last post on cleaning up your Facebook account, today I want to talk to you about how you can regulate Facebook access across your enterprise networks. I heard a story last week about a soldier in Afghanistan who posted on his Facebook status page about the location of his next mission a few days before the actual event. Needless to say, the mission was cancelled and he was sent packing.
Your concerns might not be as life-and-death related, but just as important: do you think your employees are leaking company confidential information? Do you want to put limits on what they can do while inside Facebook, such as playing Farmville or other games? How about blocking or slowing down access during business hours, but then opening up afterwards?
I began doing some research for this topic for an article that I am writing for one of TechTarget’s web sites, and found a very rich landscape that is available to enterprise IT folks. Just about every network security product has some form of control over Facebook. Some offer more granularity than others. For example, McAfee’s Firewall Enterprise offers two different controls: one for the basic Facebook access, and one for all Facebook apps. That is nice. Palo Alto Networks takes it a step further, having these two plus four additional controls for chat, mail, posting updates, and any plug-ins too. That gives IT managers a lot of control over how they want their users to act. For example, you could restrict any posting until after hours, so that users could at least browse what their friends are doing, or keep the apps off the business network entirely, but still let people check their Facebook accounts.
Sonicwall and BlueCoat have products that can be used to restrict the amount of network bandwidth that Facebook is using at any given time. This doesn’t block the site entirely, just slows it down enough to be annoying, so that hopefully users will go do something else rather than wait for slow page uploads. For college campuses that need to free up their business bandwidth during the day, this is a good idea.
And then there are several data loss prevention products that can dig deeper into the Facebook data stream and determine if any information is leaving a corporate network that shouldn’t be – such as our army grunt’s status location update. Global Velocity’s product has a lot of granularity here and can be set similarly to the Palo Alto box for examining chat or apps traffic (or all Facebook data) specifically.
The trouble is that a single product doesn’t do everything, and you might be using a competitor’s firewall that makes it more difficult to set up these controls (I am thinking about you Cisco owners). But at least several vendors are moving in the right direction to enable these kinds of controls and at the level of detail that many of us need nowadays.
The three minute way to stop losing data with Blue Coat’s DLP appliance
My latest video screencast is sponsored by Blue Coat Systems and looks at a new appliance they are selling to deal with data loss prevention (DLP). In about three minutes, I cover the unit’s major features and show how easy it is to setup and start protecting your network from potential data leaks. You can watch the video here.
Techtarget: Seven considerations when evaluating automated GRC tools
There is no shortage of tools to help financial services firms automate their governance, risk and compliance (GRC) requirements. Gartner Inc. earlier this year estimated the total market for GRC tools at $117 million in 2009, and predicted that it will have steady but slow growth for the near term. Many IT and risk managers get their start with GRC analysis by using a simple spreadsheet to track risks and security policies. But that isn’t a very scalable or reliable approach, and it is very labor-intensive and error-prone.
A better strategy is use some sort of automated GRC tool, and I take a look at how you can evaluate these tools for an article that I wrote for SearchFinancialSecurity over at TechTarget here.