Is an Apple iPod or MP3 player a threat to corporate data? Security experts increasingly believe such devices can be used to steal sensitive data from company PCs and networks. Last month, the Web was buzzing with the news that the UK Ministry of Defense was banning the use of iPods due to security concerns. Though the story -- released by Reuters -- was denied by the ministry, it has caused many to review their thinking on allowing portable devices in the workplace.
The problem is not new. Ever since PCs had floppy disks and, more recently, CD-R drives, it has been a simple matter for unscrupulous staff to steal any data they are able to access. New personal devices just add to the problem.
But according to recent research by Gartner, companies should consider banning portable storage devices from the workplace due to the risk of theft, and the fact that they can be the source of computer viruses and Trojans.
On the should-be-banned list are Smart Media and similar cards, keychain or USB drives, Sony Me-mory Sticks, CompactFlash and portable MP3 players. Gartner says that such devices can easily bypass firewalls and that a mislaid device can also be misappropriated by another member of staff.
But not everyone thinks a banning order is appropriate. Mark Blowers, a senior analyst at Butler Group, says companies have to get things in proportion.
"This is an issue, but it's more about overall security policy. It's not really feasible to ban such products outright as many people travel with them to work. It's probably more about banning them in particularly sensitive areas -- if that is pos-sible," he said.
But the problem is set to grow. Storage capacity is doubling roughly every six months, while remaining at almost the same price.
The first key development was Flash memory, which stimulated the production of personal digital assistants (PDAs). The second development was removable storage using Secure Digital, Compact-Flash or Memory Sticks, most noticeably used in digital cameras and sealed inside MP3 devices.
Finally, tiny hard drives have increased portable storage further. The 4.6cm4 Hitachi drives used in iPods, for example, can store up to 40GB, and some players have even larger capacities.
But Greg Carlow, managing director at systems integrator Rep-ton, says, the problem is also about how companies organize data.
"If someone is malevolent, they can probably do serious damage by stealing a few megabyte of data: most companies only really use about 0.1 percent of the data they own, they just never get round to managing it," Carlow said, adding that the problem lies in operating systems devised years before such storage technology was available.
"Maybe in future versions of Windows we will start to see code that isolates unknown storage devices until they have been approved by the IT [information technology] department for use on a particular machine," he said.
But there are signs that companies are tightening up security policies to take account of the risk.
"We have been giving away memory sticks to customers but quite a few have refused them because there is a company policy banning their use," says Paul Hammond, UK general manager at systems integrator CNT.
In a recent survey of 200 UK firms by software security firm Reflex Magnetics, 82 percent of respondents said they regarded mobile devices such as the iPod as a security threat. Reflex says those in the healthcare and finance sectors are most likely to toughen up their security policies soon.
Companies are also likely to look to intrusion protection software that seeks to plug gaps on desktops and servers. For example Cisco's Security Agent software sits on the PC and can bar access to the USB port.
"It's available, but only two of our customers are using it in that way," says Paul King, Cisco's senior security consultant.
"It's more a matter of firms classifying and segregating data that needs to be protected, as well as ensuring they provide encryption on laptops, which are a far greater security risk," King said.
Other firms offer encryption tools so that only encrypted access is possible to USB drives.
What is certain is that data theft will get easier as data storage devices increase in capacity while reducing in size and cost.
While the future holds the promise of vast amounts of data on holographic devices, the next few years are likely to be defined by squeezing more out of existing technology.
AIR SUPPORT: The Ministry of National Defense thanked the US for the delivery, adding that it was an indicator of the White House’s commitment to the Taiwan Relations Act Deputy Minister of National Defense Po Horng-huei (柏鴻輝) and Representative to the US Alexander Yui on Friday attended a delivery ceremony for the first of Taiwan’s long-awaited 66 F-16C/D Block 70 jets at a Lockheed Martin Corp factory in Greenville, South Carolina. “We are so proud to be the global home of the F-16 and to support Taiwan’s air defense capabilities,” US Representative William Timmons wrote on X, alongside a photograph of Taiwanese and US officials at the event. The F-16C/D Block 70 jets Taiwan ordered have the same capabilities as aircraft that had been upgraded to F-16Vs. The batch of Lockheed Martin
GRIDLOCK: The National Fire Agency’s Special Search and Rescue team is on standby to travel to the countries to help out with the rescue effort A powerful earthquake rocked Myanmar and neighboring Thailand yesterday, killing at least three people in Bangkok and burying dozens when a high-rise building under construction collapsed. Footage shared on social media from Myanmar’s second-largest city showed widespread destruction, raising fears that many were trapped under the rubble or killed. The magnitude 7.7 earthquake, with an epicenter near Mandalay in Myanmar, struck at midday and was followed by a strong magnitude 6.4 aftershock. The extent of death, injury and destruction — especially in Myanmar, which is embroiled in a civil war and where information is tightly controlled at the best of times —
China's military today said it began joint army, navy and rocket force exercises around Taiwan to "serve as a stern warning and powerful deterrent against Taiwanese independence," calling President William Lai (賴清德) a "parasite." The exercises come after Lai called Beijing a "foreign hostile force" last month. More than 10 Chinese military ships approached close to Taiwan's 24 nautical mile (44.4km) contiguous zone this morning and Taiwan sent its own warships to respond, two senior Taiwanese officials said. Taiwan has not yet detected any live fire by the Chinese military so far, one of the officials said. The drills took place after US Secretary
THUGGISH BEHAVIOR: Encouraging people to report independence supporters is another intimidation tactic that threatens cross-strait peace, the state department said China setting up an online system for reporting “Taiwanese independence” advocates is an “irresponsible and reprehensible” act, a US government spokesperson said on Friday. “China’s call for private individuals to report on alleged ‘persecution or suppression’ by supposed ‘Taiwan independence henchmen and accomplices’ is irresponsible and reprehensible,” an unnamed US Department of State spokesperson told the Central News Agency in an e-mail. The move is part of Beijing’s “intimidation campaign” against Taiwan and its supporters, and is “threatening free speech around the world, destabilizing the Indo-Pacific region, and deliberately eroding the cross-strait status quo,” the spokesperson said. The Chinese Communist Party’s “threats