Welcome!

Agile Computing Authors: Pat Romanski, Shelly Palmer, Glenda Sims, Paul Simmons, APM Blog

Related Topics: Microservices Expo, Mobile IoT, Agile Computing, Cloud Security

Microservices Expo: Article

Social Media Brings New Challenges to Government Security Administrators

The use of social networking sites and BYOD mobile devices at work brings new threats of data leaks to government agencies

Government agencies in the United States and around the world are increasing their use of social media to enhance the quality of government services and to encourage more citizen engagement and dialog. When used properly, social media can build trust and develop more efficient communications between government agencies and those looking for information. But, as beneficial as this approach is becoming for government and citizens alike, agencies must also be aware of the multitude of security problems that can be introduced when social media tools are used by government staff.

Personal use of social media by government employees while at work can introduce lost productivity, misuse of network bandwidth, exposure to unmanaged/inappropriate content, malware threats from clicking links and downloading infected content, and most important, the danger of confidential data leakage.

In addition to the many threats to government networks just mentioned, including the threat of confidential data leaks when staff members use social media on government computers, advances in personal mobile technology at work such as smartphones, MP3 players, tablets, and laptops demonstrate an even bigger more fundamental problem: the consumerization of government IT computing.

Use of mainstream public-cloud applications and personal mobile technologies from inside network security perimeters of our government networks represents a brave new world of risks for security administrators. Personal wireless devices are by-definition completely outside the control of IT security professionals, yet in many cases they are becoming approved for business use anyway due to IT budget cuts and social pressures. The fundamental fuel for this "bring your own device" (BYOD) phenomenon is the a growing percentage of employees want to remain active in social media during the work hours, monitor their personal email, and use their own "latest-greatest" personal devices rather than whatever may have been issued or approved by their government employer.

Combined, the use of social media and mobile devices increases the threat level to any government agency's network exponentially. We are seeing hackers writing code directly to attack mobile devices that can easily infiltrate the agency's networks once downloaded. Keyloggers, Trojans and other forms of malware released onto the network can be used to disrupt network operations and steal confidential government data. When logged into social media sites, government employees can post or upload (either accidently or intentionally) confidential information, and once released it can quickly spread or be passed down the line secretly to the wrong eyes.

The arsenal of Firewalls, AV, NAC, IDS, IPS, and other security tools can help mitigate the threat of malware and hacker threats on the network. Unfortunately, as the social media and BYOD culture grows, the new risk of "data leakage" must be addressed with new tools and approaches.

How can government agencies address these new threats?

Best Practice - Acceptable Use Policies
Government agencies should initially establish a thorough acceptable use policy for social media and BYOD for their employees. Depending on positions and responsibilities, employees may obtain different permissions. A well-thought-out use policy will help the agency enforce and secure social media and BYOD use, which also helps protect the agency from legal liability and compliance violations.

Best Practice - Technology and Security Solutions

In addition to policy development, technology solutions must also be deployed to ensure a successful and legally defendable policy. Complimentary technology should be flexible and allow the agency to automate the policy's enforcement. Even if an employee may not be aware of the policies, the software provides an added level of protection. For example, some security software can be used to block access to social media services and mitigate downloads from endpoint devices.

Unfortunately, we live in a time where there is no security silver bullet. But technologies that simultaneously help secure data leaks while also informing the employees in real time that their actions have been blocked because they violate use policies go a long way to create a culture of policy awareness and obedience. These "block and inform" technologies can be powerful tools because they educate staff in the exact moment of policy violation and put them on notice. For employees looking to use their own devices, written policies can limit their use or they can be required to allow security software to be installed by the IT staff.

Social media challenges arise with how to secure certain channels without blocking social media websites and services entirely. The solution requires the ability to differentiate between personal, corporate, public and confidential information in social media exchanges, so it must be data-centric and content-aware. In addition, for employees who are in positions that have legitimate reasons for social communications, this activity, in accordance with the acceptable use policy must not be affected.

Best Practice - Data Leak Prevention
Among the myriad of IT security technologies that are available, one that satisfies this set of requirements is Data Leak Prevention (DLP). A DLP solution used in conjunction with security and risk-management technologies already in place provides a critical layer of complementary protection.

With any technology, requirements for a DLP solution can be different for every agency/office and should be based on the needs, size of deployment, and associated risks. It is well documented that most data leaks originate from the inside or on a government owned machine that has been removed from the network. The added pressure of unmanaged BYOD only multiplies the threat. DLP solutions are able to stop the problem of data loss right at the source - at the workstation and mobile device. This "stop data leaks at the source" strategy offers the broadest DLP coverage precisely because it follows mobile endpoints like employee laptops outside of the network where traditional security solutions such as firewalls and content security gateways typically do not reach.

Conclusion
Government agencies should consider applying DLP technology on laptops and other endpoint devices to help eliminate the threat of data loss while addressing compliance regulations. The combination of a written, well-communicated acceptable use policy for social media and BYOD, coupled with DLP technology that includes pop-up educational warnings when a policy is being violated can reliably prevent data leaks while helping maintain compliance.

More Stories By Vincent M. Schiavo

Vincent M. Schiavo joined DeviceLock as Chief Executive Officer in September 2011. A veteran of the computer industry for more than 30 years, most recently Mr. Schiavo served as the Executive Vice President of Worldwide Sales for LogLogic, a San Jose based security information and event management provider. Prior to LogLogic, he was the Senior Vice President of Worldwide Sales and Marketing for Secure Computing, a San Jose based web information security company which was acquired by McAfee in 2008.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
DX World EXPO, LLC, a Lighthouse Point, Florida-based startup trade show producer and the creator of "DXWorldEXPO® - Digital Transformation Conference & Expo" has announced its executive management team. The team is headed by Levent Selamoglu, who has been named CEO. "Now is the time for a truly global DX event, to bring together the leading minds from the technology world in a conversation about Digital Transformation," he said in making the announcement.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Conference Guru has been named “Media Sponsor” of the 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to gre...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develop...
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, led attendees through the exciting evolution of the cloud. He looked at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering m...
"Evatronix provides design services to companies that need to integrate the IoT technology in their products but they don't necessarily have the expertise, knowledge and design team to do so," explained Adam Morawiec, VP of Business Development at Evatronix, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.
Large industrial manufacturing organizations are adopting the agile principles of cloud software companies. The industrial manufacturing development process has not scaled over time. Now that design CAD teams are geographically distributed, centralizing their work is key. With large multi-gigabyte projects, outdated tools have stifled industrial team agility, time-to-market milestones, and impacted P&L stakeholders.
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud ...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.