Welcome!

Agile Computing Authors: Elizabeth White, Pat Romanski, Jeev Trika, Liz McMillan, Yakov Fain

Related Topics: Microservices Expo, Mobile IoT, Agile Computing, Cloud Security

Microservices Expo: Article

Social Media Brings New Challenges to Government Security Administrators

The use of social networking sites and BYOD mobile devices at work brings new threats of data leaks to government agencies

Government agencies in the United States and around the world are increasing their use of social media to enhance the quality of government services and to encourage more citizen engagement and dialog. When used properly, social media can build trust and develop more efficient communications between government agencies and those looking for information. But, as beneficial as this approach is becoming for government and citizens alike, agencies must also be aware of the multitude of security problems that can be introduced when social media tools are used by government staff.

Personal use of social media by government employees while at work can introduce lost productivity, misuse of network bandwidth, exposure to unmanaged/inappropriate content, malware threats from clicking links and downloading infected content, and most important, the danger of confidential data leakage.

In addition to the many threats to government networks just mentioned, including the threat of confidential data leaks when staff members use social media on government computers, advances in personal mobile technology at work such as smartphones, MP3 players, tablets, and laptops demonstrate an even bigger more fundamental problem: the consumerization of government IT computing.

Use of mainstream public-cloud applications and personal mobile technologies from inside network security perimeters of our government networks represents a brave new world of risks for security administrators. Personal wireless devices are by-definition completely outside the control of IT security professionals, yet in many cases they are becoming approved for business use anyway due to IT budget cuts and social pressures. The fundamental fuel for this "bring your own device" (BYOD) phenomenon is the a growing percentage of employees want to remain active in social media during the work hours, monitor their personal email, and use their own "latest-greatest" personal devices rather than whatever may have been issued or approved by their government employer.

Combined, the use of social media and mobile devices increases the threat level to any government agency's network exponentially. We are seeing hackers writing code directly to attack mobile devices that can easily infiltrate the agency's networks once downloaded. Keyloggers, Trojans and other forms of malware released onto the network can be used to disrupt network operations and steal confidential government data. When logged into social media sites, government employees can post or upload (either accidently or intentionally) confidential information, and once released it can quickly spread or be passed down the line secretly to the wrong eyes.

The arsenal of Firewalls, AV, NAC, IDS, IPS, and other security tools can help mitigate the threat of malware and hacker threats on the network. Unfortunately, as the social media and BYOD culture grows, the new risk of "data leakage" must be addressed with new tools and approaches.

How can government agencies address these new threats?

Best Practice - Acceptable Use Policies
Government agencies should initially establish a thorough acceptable use policy for social media and BYOD for their employees. Depending on positions and responsibilities, employees may obtain different permissions. A well-thought-out use policy will help the agency enforce and secure social media and BYOD use, which also helps protect the agency from legal liability and compliance violations.

Best Practice - Technology and Security Solutions

In addition to policy development, technology solutions must also be deployed to ensure a successful and legally defendable policy. Complimentary technology should be flexible and allow the agency to automate the policy's enforcement. Even if an employee may not be aware of the policies, the software provides an added level of protection. For example, some security software can be used to block access to social media services and mitigate downloads from endpoint devices.

Unfortunately, we live in a time where there is no security silver bullet. But technologies that simultaneously help secure data leaks while also informing the employees in real time that their actions have been blocked because they violate use policies go a long way to create a culture of policy awareness and obedience. These "block and inform" technologies can be powerful tools because they educate staff in the exact moment of policy violation and put them on notice. For employees looking to use their own devices, written policies can limit their use or they can be required to allow security software to be installed by the IT staff.

Social media challenges arise with how to secure certain channels without blocking social media websites and services entirely. The solution requires the ability to differentiate between personal, corporate, public and confidential information in social media exchanges, so it must be data-centric and content-aware. In addition, for employees who are in positions that have legitimate reasons for social communications, this activity, in accordance with the acceptable use policy must not be affected.

Best Practice - Data Leak Prevention
Among the myriad of IT security technologies that are available, one that satisfies this set of requirements is Data Leak Prevention (DLP). A DLP solution used in conjunction with security and risk-management technologies already in place provides a critical layer of complementary protection.

With any technology, requirements for a DLP solution can be different for every agency/office and should be based on the needs, size of deployment, and associated risks. It is well documented that most data leaks originate from the inside or on a government owned machine that has been removed from the network. The added pressure of unmanaged BYOD only multiplies the threat. DLP solutions are able to stop the problem of data loss right at the source - at the workstation and mobile device. This "stop data leaks at the source" strategy offers the broadest DLP coverage precisely because it follows mobile endpoints like employee laptops outside of the network where traditional security solutions such as firewalls and content security gateways typically do not reach.

Conclusion
Government agencies should consider applying DLP technology on laptops and other endpoint devices to help eliminate the threat of data loss while addressing compliance regulations. The combination of a written, well-communicated acceptable use policy for social media and BYOD, coupled with DLP technology that includes pop-up educational warnings when a policy is being violated can reliably prevent data leaks while helping maintain compliance.

More Stories By Vincent M. Schiavo

Vincent M. Schiavo joined DeviceLock as Chief Executive Officer in September 2011. A veteran of the computer industry for more than 30 years, most recently Mr. Schiavo served as the Executive Vice President of Worldwide Sales for LogLogic, a San Jose based security information and event management provider. Prior to LogLogic, he was the Senior Vice President of Worldwide Sales and Marketing for Secure Computing, a San Jose based web information security company which was acquired by McAfee in 2008.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...
In his session at 18th Cloud Expo, Bruce Swann, Senior Product Marketing Manager at Adobe, will discuss how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Bruce Swann has more than 15 years of experience working with digital marketing disciplines like web analytics, social med...
What a difference a year makes. Organizations aren’t just talking about IoT possibilities, it is now baked into their core business strategy. With IoT, billions of devices generating data from different companies on different networks around the globe need to interact. From efficiency to better customer insights to completely new business models, IoT will turn traditional business models upside down. In the new customer-centric age, the key to success is delivering critical services and apps wit...
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
SYS-CON Events announced today that ContentMX, the marketing technology and services company with a singular mission to increase engagement and drive more conversations for enterprise, channel and SMB technology marketers, has been named “Sponsor & Exhibitor Lounge Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York. “CloudExpo is a great opportunity to start a conversation with new prospects, but what happens after the...
SYS-CON Events announced today that 24Notion has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. 24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to con...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
SYS-CON Events announced today BZ Media LLC has been named “Media Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and Commercial Drone markets.
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, will discuss the importance of WebRTC and how it enables companies to fo...
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit y...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will discuss the vast to...
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
Customer experience has become a competitive differentiator for companies, and it’s imperative that brands seamlessly connect the customer journey across all platforms. With the continued explosion of IoT, join us for a look at how to build a winning digital foundation in the connected era – today and in the future. In his session at @ThingsExpo, Chris Nguyen, Group Product Marketing Manager at Adobe, will discuss how to successfully leverage mobile, rapidly deploy content, capture real-time d...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
IoT generates lots of temporal data. But how do you unlock its value? How do you coordinate the diverse moving parts that must come together when developing your IoT product? What are the key challenges addressed by Data as a Service? How does cloud computing underlie and connect the notions of Digital and DevOps What is the impact of the API economy? What is the business imperative for Cognitive Computing? Get all these questions and hundreds more like them answered at the 18th Cloud Expo...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...