Joining the dots
โ Scribed by Richard Walters
- Book ID
- 104392686
- Publisher
- Elsevier Science
- Year
- 2009
- Tongue
- English
- Weight
- 259 KB
- Volume
- 2009
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
In one case, an office multi-function device (MFD) was used to scan sensitive documents to PDF and email them direct to an external recipient by entering their email address on the LCD screen of what was essentially a sophisticated photocopier. In another, a customer services manager asked all team members for their passwords just in case anything arose when they were off sick or on holiday, subsequently using those accounts to defraud the company of hundreds of thousands of pounds.
Data leakage vectors
The number of data leakage vectors available to the internal user is increasing. Removable media and email are reasonably well addressed, while other vectors Richard Walters, product director, Overtis Systems Data loss continues to grab the headlines. For those of us in the information security industry, these stories are testament to the fact that we are failing. Data is being removed intentionally, and disseminated unintentionally, from UK organisations on an unprecedented scale. Examples we've seen range from gaining physical access to restricted areas (through access card theft, lack of anti-passback on turnstiles, and plain simple tailgating), to data theft over instant messenger using file transfer, and social networking sites (uploading a file from the corporate network during office hours, and downloading it to another location later).
๐ SIMILAR VOLUMES