Nearly Half of Organizations Have Lost Sensitive or Confidential Information on USB Drives in Just the Past Two Years
Subject: General Tech | August 9, 2011 - 01:27 PM | Jeremy Hellstrom
Tagged: security, fud
The next time your boss complains when you suggest that picking up secure USB sticks because of the price, you might want to reference this report from Kingston which details several horror stories of what happens with a lax policy towards portable storage. We have seen Stuxnet recently, as well there is a long list of tricks that can be played with USB devices with the U3 autorun present on many USB devices.
This goes far beyond just a complaint about using USB sticks received for free at trade shows or picked up on discount from Costco, the report cites an instance where unmarked USB sticks were left in obvious spots in government parking lots and over half of them ended up being plugged into the wok PC of the person who found it. Maybe now spending a little extra on secure USB sticks will seem a little more attractive to the beancounters.
Fountain Valley, CA -- August 9, 2011 -- Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., the independent world leader in memory products, today announced the results of a study conducted by the Ponemon Institute looking at USB prevalence and risk in organizations. The study found that inexpensive consumer USB Flash drives are ubiquitous in all manner of enterprise and government environments ― typically with very little oversight or controls, even in the face of frequent and high profile incidents of sensitive data loss. The Ponemon Institute is an independent group that conducts studies on critical issues affecting the management and security of sensitive information about people and organizations.
The study underscores the pressing need for organizations to adopt more secure USB products and policies. A group of 743 IT professionals and IT security practitioners from global companies based in the United States were polled, and all acknowledged the importance of USB drives from a productivity standpoint. They cautioned, however, about the lack of organizational focus regarding security for these tools to meet appropriate data protection and business objectives.
The most recent example of how easily rogue USB drives can enter an organization can be seen in a U.S. Department of Homeland Security test in which USBs were ‘accidentally’ dropped in government parking lots. Without any identifying markings on the USB stick, 60 percent of employees plugged the drives into government computers. With a ‘valid’ government seal, the plug-in rate reached 90 percent.
According to the Ponemon study, more than 40 percent of organizations surveyed report having more than 50,000 USB drives in use in their organizations, with nearly 20 percent having more than 100,000 drives in circulation. The study finds that a whopping 71 percent of respondents do not consider the protection of confidential and sensitive information on USB Flash drives to be a high priority. At the same time, the majority of these same respondents feel that data breaches are caused by missing USB drives.
The Ponemon study concluded that a staggering 12,000 customer, consumer and employee records were believed to be lost on average by these same companies as a result of missing USBs. According to a previously released Ponemon report, the average cost of a data breach is $214 per record, making the potential average total cost of lost records to the organizations surveyed for the Ponemon USB Flash drive study, reach upwards of $2.5 million (USD). Other key findings in the report include:
Evidence of widespread compromise is apparent:
- Nearly 50 percent of organizations confirmed lost drives containing sensitive or confidential information in the past 24 months.
- The majority of those organizations (67 percent) confirmed that they had multiple loss events – in some cases, more than 10 separate events.
Oversight and control of USBs in enterprises can be better:
- Free USB sticks from conferences/trade shows, business meetings and similar events are used by 72 percent of employees ― even in organizations that mandate the use of secure USBs.
- In terms of policies and controls, of the hundreds of IT professionals and IT security professionals polled, only 29 percent felt that their organizations had adequate policies to prevent USB misuse.
“An unsecured USB drive can open the door for major data loss incidents,” said Larry Ponemon, Chairman and Founder of the Ponemon Institute. “Organizations watch very carefully, and put a plethora of controls around, what enters their businesses from cyberspace. This study drives home the point that they must also take a more aggressive stance on addressing the risks that exist in virtually every employee’s pocket.”
“Kingston believes a lack of oversight, education and corporate confusion are factors that lead to the overwhelming majority of data loss when it comes to USB Flash drives,” said John Terpening, Secure USB business manager, Kingston. “Organizations fear that any attempt to control a device like a USB is likely to be futile and costly, both in terms of budget and loss of productivity. However, a simple analysis of what an organization needs and the knowledge that there is a range of easy-to-use, cost-effective, secure USB Flash drive solutions can go a long way toward enabling organizations and their employees to get a handle on the issue.”
Subject: General Tech | May 26, 2011 - 12:12 PM | Jeremy Hellstrom
Tagged: fud, skype, microsoft
According to The Inquirer, at 12:15 GMT (+1 hr thanks to daylight savings), Skype suffered a major network failure that seems to not only have taken out the Skype VoIP client but also impacted the availablitity of their site. As of right now there is no work around or solution, Skype is investigating the cause but for now other clients are your best bet for communicating over the web.
Since this has occured 2 weeks after Microsoft purchased Skype, speculation is running rampant that this is some sort of planned interruption. It seems a little far fetched to think that even a company with as much financial power as Microsoft would dump $8.5 billion just to shut down a competing service. They are going to want some return on their investment and simply using Skype's patents, some of which are still under review now or its infrastructure to prop up Sharepoint is not going to return that money. Ad generated revenue on the sidebar of the client and hooking this up to Microsoft's various social and gaming applications seems more likely, which implies that shutting down Skype is the last thing on their mind.
Hopefully it will be fixed in time for This Week in Computer Hardware.
"VOICE OVER IP (VoIP) and chat service Skype has crashed throughout the world and continues to crash on login, leading many to suspect that its recent acquisition by Microsoft is a definite disaster.
The service began to crash around 12:15pm UK time, kicking people offline and freezing when they tried to log back in again. Other users who remained online had difficulties making calls. Restarting your PC or reinstalling Skype has no effect, as the problem is clearly on Skype's end."
Here is some more Tech News from around the web:
- Intel to offer Cedar Trail CPUs with prices 30-50% less than existing Atom CPUs @ DigiTimes
- Unpatched IE bug exposes sensitive Facebook creds @ The Register
- HTL Tests out New YouTube 3D Vision Playback Capability @Hi Tech Legion
- Samsung PL210 14 Megapixel Digital Camera @ TechwareLabs
- Win a SteelSeries Medal of Honor 5XB Headset @ eTeknix
Subject: General Tech | May 25, 2011 - 11:48 AM | Jeremy Hellstrom
Tagged: fud, security
The Blackhole exploit kit, which until now required you to have a pocketful of money and enough hacker cred to get onto the sites where was available for sale, is now freely available to any and all. The exploit kit is a tool that allows misanthropes to commit a type of drive by attack, where clicking on a 'tainted' iframe will allow remote code execution to install a payload on your system. It was part of the famous US Postal Service attack that occurred recently as well as other incidents The Register mentions. Even better, the source code for ZeuS was also jsut made available. Patch early, patch often.
"A free version of the Blackhole exploit kit has appeared online in a development that radically reduces the entry-level costs of getting into cybercrime.
The Blackhole exploit kit, which up until now would cost around $1,500 for an annual licence, creates a handy way to plant malicious scripts on compromised websites. Surfers visiting legitimate sites can be redirected using these scripts to scareware portals on sites designed to exploit browser vulnerabilities in order to distribute banking Trojans, such as those created from the ZeuS toolkit."
Here is some more Tech News from around the web:
- VIA Technologies steps into developing servers @ DigiTimes
- Time to try Windows once again... @ t-break
- TRENDnet 450Mbps Dual Band Wireless N USB Adapter Review @ Madshrimps
- Microsoft announces Mango update to Windows Phone @ The Inquirer
Subject: General Tech | May 17, 2011 - 01:23 PM | Jeremy Hellstrom
Tagged: Android, security, clientlogin, impersonation, fud
Researchers at Germany's University of Ulm have discovered a vulnerabliity in Android's authentication protocol, known as ClientLogin which should protect your login credentials to apps like your contact list and your calendar. It seems that while your request is encrypted, the response which includes your credentials is sent back in plain text, and those credentials remain valid for 2 weeks. The new versions of Android have fixed this flaw but according to the story at The Register connections to Picassa still return in plain text.
"The vast majority of devices running Google's Android operating system are vulnerable to attacks that allow adversaries to steal the digital credentials used to access calendars, contacts, and other sensitive data stored on the search giant's servers, university researchers have warned."
Here is some more Tech News from around the web:
- Boot Linux In Your Browser @ Slashdot
- TSMC joins SEMATECH @ SemiAccurate
- Meet DOCSIS, Part 2: the jump from 2.0 to 3.0 @ Ars Technica
- AMD chases servers with fanless FirePro GPU @ The Register
- The TR Podcast 87: The Tri-fecta: 3D transistors, Z68, and Level 10 GT
Get notified when we go live!