Launching Mobilewatch: Transforming Security with Locationing
Total Page:16
File Type:pdf, Size:1020Kb
ISSUE 23, 20 April 2016 whitenews GLOBAL PRIVACY & TECHNOLOGY NEWS ISSUE 23 Headlines: Disappearing Into Air: Insider-Spy Trend: Playing Hot Potato: 21 Century Data Thefts: How to Manage the Banks Hiring Former Everything You Need to From Social Engineering Threat of Trade Secret Intelligence Agents to Spy Know About Encryption and Phishing to Hacks Theft in The Cloud Era? on Their Behalf and Its Security and Cyber Leaks Launching Mobilewatch: Transforming Security with Locationing Spring brings new life and transformation. We at Whiterock have fully embraced this as we are marrying up the IoT technology with the security applications. This week, on 19-20 April 2016, at the Security and counter Terror EXPO in London, we are launching a brand new IoT technology, Mobilewatch - that detects and locates mobile devices – to the UK and Europe. With this, we are transforming Whiterock into a technology company. We are coming out with a new brand and have revamped everything – our strategies, people, services, HQ and technology. Appropriately, the feature story in this issue focuses on mobile phones and how the location based services is ready to transform the security industry. With 18 billion connected devices in the world, we live in the era of everything connected. Whilst this might be beneficial for the ‘bad guys’, being connected is really positive also for the security industry. The company transformation also changes our news. We will be much more tech focused, which you will notice already in this issue and even more so in the upcoming newsletters, which will look, feel and read different. Oh, and I almost forgot – we are making the Whitenews available to all interested businesses. If you are unable to join us this week @SCTX in Olympia, London, I want to invite you to our brand new demonstration centre at our HQ near London, where you can see the Mobilewatch capabilities live. Just get in touch! Raili Maripuu WhiteRock CEO whiterock PRIVACY & TECHNOLOGY EDITORIAL PAGE whiterock 2 PRIVACY & TECHNOLOGY Brand New Whiterock: Contents: Embracing Technology & Technology Transforming Security • Dissappearing Into Air: Trade Secrets and Cloud 3 Whiterock is transforming. This month, and one-year worth News of preparations later, we are excited to expand into brand • Insider Spy Trend: Banks Hiring Ex-Agents to Spy new mobile security and location based services markets, • IoT Surveillance: Germany Authorises Police Spying 4-5 currently valued at US$1,500 million and US$11.36 billion • Stolen Satellites: Canada Battles Chinese Espionage respectively. We have revamped everything – our counter espionage strategies, technology, people, headquarters, services and branding in general. Feature 6-8 With over two decades in the security market, Whiterock • Launching Mobilewatch: Security with LBS has protected hundreds of high-level confidential business events and board meetings from information leaks, and Technology audited often lacking security measures in thousands • New Technology: Camera that Sees Around Corners of corporate office spaces worldwide. Our 20 years of experience has clearly confirmed that the two leading threats • Printer Vulnerability Leads to Reverse-Engineering 9-10 to a competitive advantage of any business are humans and • 21 Century Hacking: 7 Worst Data Security Breaches mobile devices. For years now, mobile phones have been a number one espionage threat, and combined with humans Extra these devices have become even lethal to some businesses. • Playing Hot Potato: ‘Encryption for Dummies’ As a company with a strong R&D vision, we are always • Woven by Spy: The Rise of American Textile Industry 11 on a lookout for new solutions that cater for corporate • Video of the Month: The Great Brain Robbery of US requirements. Whilst we have worked with many cutting- edge security technologies, we have really been struggling to Letter From America find a system that manages mobile devices individually over a large area whilst respecting the privacy of each person. • Worst Leaker Since Titanic: Ensuring Wi-Fi Security 12 Until we found Mobilewatch. This is the world’s most accurate mobile detection and locationing technology, Cartoon of the Month: powered by AirPatrol / Sysorex, and now available in the UK and European markets. It is a cutting-edge yet non- Lucky Days are on Their Way! intrusive geofencing product that detects and instantly locates all mobile devices operating on wireless and cellular networks within 10 feet or 3 metres. It is a necessary tool for fighting terrorism, helping communication, consumer behaviour research, or for providing much needed security blanket for our corporate clients in protecting their most sensitive corporate meetings and events. This technology is already widely and successfully used in security sector in the US, such as trading floors, highly sensitive executive meetings, airports, hospitals as well as governments and their enforcement agencies. Mobilewatch is a powerful new locationing technology also in the retail environment, again successfully used by retail banks, shopping centres and airports in the US. We are excited about our brand new demonstration centre in Whiterock headquarters, where we can show capabilities of the Mobilewatch technology live. This is truly the only place in Europe, where you can see this technology in action. We live in the era of almost absolute connectivity. Last year, there were 18 billion connected devices in the world, a figure that by a conservative view is estimated to grow fast up to 50 billion connected devices by 2020. With these figures in mind and the impact they leave on the world economy in Did You Know? general, we are proud to be introducing the Mobilewatch and excited to share with you the experience of securing mobiles UK spy agency GCHQ has admitted that it lost in a new way. the cyber-security battle on a national level despite the Government spending almost £1 billion. “I think the best way to sum up the challenge we face is that while we’ve done a lot over the past five years and RAILI MARIPUU spent quite a lot of money as a Government, particularly in CEO those years of austerity we’ve been through, the bottom line is it hasn’t worked,” said Alex Dewedney, Director of UK Cyber Security at CESG/GCHQ. more... whiterock PRIVACY & TECHNOLOGY TECHNOLOGY whiterock 3 PRIVACY & TECHNOLOGY Disappearing Into Air: Trade Secret Theft in the Cloud Era The variety of methods that corporate spies and governments use to get their hands on extremely valuable trade secrets and other sensitive information has widened considerably in just a decade. Therefore, organisations have become more vigilant in marking their trade secrets as confidential whilst also restricting employee access to sensitive data. However, these efforts often neglect a relatively new, but significant, threat: spying through cloud-based storage. Therefore, another option is to select a Companies that operate under Bring-Your- secure system, controlled by the employer, Own-Device (BYOD) policies should take One of the first such cases to hit the headlines with a requirement that employees submit advantage of ‘mobile device management’ was the lawsuit that San Francisco-based usernames and passwords for all accounts to (MDM) software, which enables employers computer gaming company Zynga filed the company with the agreement that login to override personal passwords and wipe against its former employee, Alan Patmore, in information is the property of the company. devices remotely. When an employee 2012. Patmore was found to have uploaded Similar policy should also be applied to the departs, his/her name should be removed 760 Zynga documents onto his personal company’s social media accounts such as from email group lists, distribution lists, the Dropbox account before leaving to become Twitter, Facebook, and LinkedIn. The aim company website, and the building directory, Vice President of a competitor, Kixeye. here is not to be able to prove in court that all email, user accounts and passwords of the Despite the successful suit, it was a dramatic a former employee has violated company terminated employee should be deactivated, incident for the gaming giant, resulting in protocol if this happens, but to promote and all access privileges should be removed. its share price falling significantly over the awareness and address the possibility before course of the following year and eventually it becomes a threat. Although at first glance this relatively leading to lawsuits alleging insider trading. new threat may seem difficult to tackle, In fact, preventive measures such as policy organisations quite simply only need to get implementation are often the easiest their ‘corporate heads’ out of the clouds. When an employee quits or is and least costly ways to tackle the threat With the right policies and exit measures, it terminated, the business documents associated with cloud sharing. Without filing is possible to control and contain the damage in cloud may be locked away in a a lawsuit, options for compensation are that could otherwise ruin your business. location that is inaccessible to the very limited. Recovering company property from terminated employees has become company whilst still allowing the ex- greatly complicated. Employees can easily employee to access trade secrets in send documents to their cloud-based email 5 Popular Clouds : order to spy on the firm. accounts, such as Gmail.com, for off-site use. What Do You Use? For example, at the end of 2015, the CARBONITE: Online