Trust No One
by Nick Lowe - Check Point’s MD for Northern Europe - Tuesday, 11 November 2008.
Cold shoulder

Don’t forget that people can steal data by simply looking and reading, even when you’ve locked down the electronic routes for data theft. A senior executive that I know was flying to the UK, and had to tell the person next to him that 1) he could read the high-level presentation on his neighbor's screen and 2) that their two companies were in fact deadly rivals. This sparked a lively conversation. And while the chances of this happening are small, it shows you can’t be too sure who’s looking over your shoulder.

The big fix

What do you do if your home PC or laptop goes wrong? Well, this really depends on the type of repair. If it’s a hardware repair, then consider keeping the hard drive and sending the laptop without it, to keep any personal or business data secure against malicious or well-intentioned copying. If the drive itself is faulty, be very careful who you choose to try and fix it – the data is still likely to be salvageable. It may be safer to destroy the drive and get a new one fitted – which is why regular back-ups not only keep you running if a PC is faulty: they’re also important for security.

Trust, but verify

These examples make the point that your data is only a couple of steps away from misuse, and the intentions behind that misuse actually do not matter. Of course you need to have trust in your staff. You should be selective over what you entrust to them, and also verify that security is maintained. To protect against leaks and breaches, security has to be automated, and set up so that your employees cannot tamper with the process. Don’t leave decisions on what to secure, and when, to your staff. First, it’s not their job to decide this, and second, nor should they have to worry about it. It means thinking about what data you allow your staff – at all levels – to carry with them. It means automatic encryption of disks on laptops, and the same for any data, which is copied to portable storage devices. By taking the potential for human error out of the loop, you make a giant stride in security.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 4th