Showing posts with label IP TV. Show all posts
Showing posts with label IP TV. Show all posts

Friday, October 21, 2011

BYOD: ‘bring your own device’ How will it impact your company

In case you haven't heard, the Bring Your Own device to work strategy is doing the rounds in the more enlightened corporate IT world and is a very attractive option for Developers, Administrators and other IT geeks of that ilk.

That aside, as a non-geek, BYOD will require serious attention to the infrastructure and support policies within your organisation.

The one really good reason not to let employees use their own smartphone, notebook or tablet at work, is because it creates an IT management nightmare.

Firstly or blatantly, there are inherent security and regulatory compliance risks. Unless you have complete control or have great faith the responsibility of IT geeks to protect their own assets.

Even if you restrict and /or allow certain products or technologies that people can bring and use, it will be next to impossible to make sure everyone keeps their machines updated with the proper OS and application patches.

If you use the argument that BYOD will save the company money on assets, their maintenance and their depreciation, you may be disappointed. Many businesses supporting BYOD expect employees to buy and support devices at their own expense but the boundary between the BYOD asset an dthe infrastructure and security policies behind that may be blurred.

Consequently, there is a high risk of holes opening up in your Securoty, DMZ and Firewall. The money not spent on assets may have to be diverted to protect the infrastructure and will require the development of new IT management policies. Can you say your organization is BOYD ready?

To simplify small and midsize businesses (SMEs) should be prepared to sense BYOD and it's impact in the following ways.

#1: Your technology upgrade cycles will be shorter
Most smartphones are turned over every one or two years, because of carrier contracts. That means employees will be exposed to new features more quickly and be able to keep up with business enhancing features made available on open platforms e.g. Skype, Social media, etc.

#2: You will need to consider supporting or including more devices, not fewer
Even if your company chooses not to let employees bring their own smartphones, consumer tablets or notebooks into their work setting, it will need to consider adding more devices to the menu that allows people to work whilst travelling. Consider this an evolution of your corporate benefits or perks strategies. People should be able to choose their own device for work, even if they don’t own them outright.

#3: You need to rethink how you distribute applications
Thanks to Apple, most of us have become really familiar with the idea that you can download pretty much any application you need from searchable store. Over time, employees will come to expect the same from our IT team. Updates and upgrades will be enforced through alerts, much like the store concept.

#4: You need to raise your game on mobile security
Mobile malware and antivirus software packages exist, but they haven’t been widely used. If you allow people to bring their own mobile device, that needs to change. What’s more, your organisation will need to govern what data can and cannot be downloaded locally. That’s especially true in certain industries, especially healthcare or financial services where the Data Protection Act is very pertinent.

#5: You need to rethink the concept of mobility.
IDC expects the number of mobile workers worldwide to surpass 1.2 billion by 2013. Why would you provision someone with a desktop computer, even if it is a person who traditionally works in a back office position, if there is a chance that he or she might need greater flexibility in the future?

Forrester Research predicts that up to 60 percent of information workers will need to work in some location outside their office during the average workweek. Does that number fit well with your asset projections for notebook computers, media tablets or smartphones in your organisation?

Bring Your Own Device to work certainly has an allure and attraction from an financial asset management perspective and as a motivator for Developers and IT Geeks but have we thought this all the way through and are we, and our organisations really ready to adopt this strategy.

Friday, July 17, 2009

UK Investigation into Cyber Attack goes Global

UK authorities have launched an investigation into the recent cyberattacks that crippled Web sites in the U.S. and South Korea, as the trail to find the perpetrators stretches around the world.

On Tuesday, the Vietnamese security vendor Bach Khoa Internetwork Security (Bkis) said it had identified a master command-and-control server used to coordinate the denial-of-service attacks, which took down major U.S. and South Korean government Web sites.

Zombie PCs

A command-and-control server is used to distribute instructions to zombie PCs, which form a botnet that can be used to bombard Web sites with traffic, rendering the sites useless. The server was on an IP (Internet Protocol) address used by Global Digital Broadcast, an IP TV technology company based in Brighton, England, according to Bkis.

BKIS control

That master server distributed instructions to eight other command-and-control servers used in the attacks. Bkis, which managed to gain control of two of the eight servers, said that 166,908 hacked computers in 74 countries were used in the attacks and were programmed to seek out and download new instructions every three minutes, from designated random sites.

Miami Master Server

But the master server isn't in the U.K.; it's in Miami, according to Tim Wray, one of the owners of Digital Global Broadcast, who spoke to IDG News Service on Tuesday evening, London time.
The server belongs to Digital Latin America (DLA), which is one of Digital Global Broadcast's partners. DLA encodes Latin American programming for distribution over IP TV-compatible devices, such as set-top boxes.

VPN Connections
New programs are taken from satellite and encoded into the proper format, then sent over VPN (Virtual Private Network) to the U.K., where Digital Global Broadcast distributes the content, Wray said. The VPN connection made it appear the master server belonged to Digital Global Broadcast when it actually is in DLA's Miami data center.

Engineers from Digital Global Broadcast quickly discounted that the attacks originated with the North Korean government, which South Korean authorities have suggested may be responsible.

Digital Global Broadcast notified

Digital Global Broadcast was notified of a problem by its hosting provider, C4L, Wray said. His company has also been contacted by the U.K.'s Serious Organised Crime Agency (SOCA). A SOCA official said she could not confirm or deny an investigation.

Amaya Ariztoy, general counsel for DLA, said the company examined the server in question today and found "viruses" on it. "We are conducting an investigation internally," Ariztoy said.

Forensic Analysis
Investigators will need to seize that master server for forensic analysis. It's often a race against the hackers, since if the server is still under their control, critical data could be erased that would help an investigation.

"It's a tedious process and you want to do it as quickly as possible," said Jose Nazario, manager of security research for Arbor Networks.

Data Logs Audit
Data such as log files, audit trails and uploaded files will be sought by investigators, Nazario said. "The holy grail you are looking for are pieces of forensics that reveal where the attacker connected from and when," he said.

D-o-S MyDoom Variant
To conduct the attacks, the hackers modified a relatively old piece of malware called MyDoom, which first appeared in January 2004. MyDoom has e-mail worm characteristics and can also download other malware to a PC and be programmed to conduct denial-of-service attacks against Web sites.

The Evidence Trail
Analysis of the MyDoom variant used in the attacks isn't that impressive. "I still think the code is pretty sloppy, which I hope means they [the hackers] leave a good evidence trail," Nazario said.

Perpetrator Profile
It could also be that the perpetrator is either very confident that they will not be found, is trying to hide in the pseudo amateur world of the cyber geeks and cyber vandals, is not concerned or is immune from discovery.

Maybe, a virtual self destructive personality that is implementing a non fatal 'suicide' mission for yet to be revealed reasons.