Seven Security Risks from Consumer-Grade File Sync Services

[The following is courtesy of Anchor – an eFolder company and a ManageOps partner.]

Consumer-grade file sync solutions (referred to hereafter as “CGFS solutions” to conserve electrons) pose many challenges to businesses that care about control and visibility over company data. You may think that you have nothing to worry about in this area, but the odds are that if you have not provided your employees with an approved business-grade solution, you have multiple people using multiple file sync solutions that you don’t even know about. Here’s why that’s a problem:

  1. Data theft – Most of the problems with CGFS solutions emanate from a lack of oversight. Business owners are not privy to when an instance is installed, and are unable to control which employee devices can or cannot sync with a corporate PC. Use of CFGS solutions can open the door to company data being synced (without approval) across personal devices. These personal devices, which accompany employees on public transit, at coffee shops, and with friends, exponentially increase the chance of data being stolen or shared with the wrong parties.
  2. Data loss – Lacking visibility over the movement of files or file versions across end-points, CFGS solutions improperly backup (or do not backup at all) files that were modified on an employee device. If an end-point is compromised or lost, this lack of visibility can result in the inability to restore the most current version of a file…or any version for that matter.
  3. Corrupted data – In a study by CERN, silent data corruption was observed in 1 out of every 1500 files. While many businesses trust their cloud solution providers to make sure that stored data maintains its integrity year after year, most CGFS solutions don’t implement data integrity assurance systems to ensure that any bit-rot or corrupted data is replaced with a redundant copy of the original.
  4. Lawsuits – CGFS solutions give carte blanche power to end-users over the ability to permanently delete and share files. This can result in the permanent loss of critical business documents as well as the sharing of confidential information that can break privacy agreements in place with clients and third-parties.
  5. Compliance violations – Since CGFS solutions have loose (or non-existent) file retention and file access controls, you could be setting yourself up for a compliance violation. Many compliance policies require that files be held for a specific duration and only be accessed by certain people; in these cases, it is imperative to employ strict controls over how long files are kept and who can access them.
  6. Loss of accountability – Without detailed reports and alerts over system-level activity, CGFS solutions can result in loss of accountability over changes to user accounts, organizations, passwords, and other entities. If a malicious admin gains access to the system, hundreds of hours of configuration time can be undone if no alerting system is in place to notify other admins of these changes.
  7. Loss of file access – Consumer-grade solutions don’t track which users and machines touched a file and at which times. This can be a big problem if you’re trying to determine the events leading up to a file’s creation, modification, or deletion. Additionally, many solutions track and associate a small set of file events which can result in a broken access trail if a file is renamed, for example.

Consumer-grade file sync solutions pose many challenges to businesses that care about control and visibility over company data. Allowing employees to utilize CFGS solutions can lead to massive data leaks and security breaches.

Many companies have formal policies or discourage employees from using their own accounts. But while blacklisting common CFGS solutions may curtail the security risks in the short term, employees will ultimately find ways to get around company firewalls and restrictive policies that they feel interfere with their productivity.

The best way for business to handle this is to deploy a company-approved application that will allow IT to control the data, yet grants employees the access and functionality they feel they need to be productive.

CEO Scott Gorcester Speaks on eFolder Panel

Last week, ManageOps CEO Scott Gorcester was a part of an expert panel for eFolder’s Partner Round Table at the Capitol Grille in downtown Seattle. IT professionals from the Puget Sound region attended to share their experiences and gain a better understanding of eFolder’s offerings and discuss how they provide businesses with best in class managed cloud storage.

efolder

The conversation started with the panel sharing how they solve business issues with eFolder’s Business Class file sync product called “Anchor.” eFolder Anchor is a best-in-class cloud synchronization product that offers managed file sharing, multiple folder backup, and granular control of user-access all wrapped in a neat package that resellers can brand as their own. Anchor and other eFolder products are designed for the reseller and offer multi-level delegated administrative access for their customers.

DSCN0692

Once the panel began to share their experiences the attendees jumped right in and began to share how they use or intend to use this great product. This sparked a great conversation around how to solve problems and how the attendees price the product. Scott shared how ManageOps uses the Anchor file sync to empower our clients with corporate data at their fingertips and other facilities such as secure large file transmissions. As a cloud services provider that sells through channel partners, ManageOps has found the multi-level delegated administration feature to be particularly valuable, as it allows ManageOps to give a single partner delegated admin rights over all of their customers, and the partner can, in turn, give an individual customer delegated admin rights over all their users.

DSCN0694

One of the first concerns to pop up in conversation was moving data from one vendor to another. One attendee mentioned that a certain vendor never asked for any verification before releasing customer data. This started a whole conversation revolving around security of data, especially for high priority businesses like law firms. ManageOps provides cloud services to Law Firms large and small and Scott was happy to share how ManageOps solves storage and data access with eFolder’s Anchor product. Fellow panelists and numerous attendees shared some great content and forged new relationships during this event.

eFolder holds similar events all over the country, and we highly encourage partners and end-users to seek out and attend one or more of their presentations.

The Great Superfishing Expedition of 2015

In a move that will probably end up in the top ten technology blunders of the year, Lenovo decided, starting in September 2014, to pre-install Superfish VisualDiscovery software on some of their PCs. (Fortunately for most of the readers of this blog, it appears that it was primarily the consumer products that were affected, not the business products.) The “visual search” concept behind Superfish is interesting – the intent is that a user could hover over a picture in their browser, and Superfish would pop up links to shopping sites that sell the item in the picture. I could see where that would be some pretty cool functionality…if the user wanted that functionality, if the user intentionally installed the software, and if the user could easily turn the functionality on and off as desired. But that’s not what happened – and here’s why it’s a big problem.

In order to perform this function when a user has an SSL-encrypted connection to a Web site, Superfish has to insert itself into the middle of that encrypted connection. It has to intercept the data coming from the shopping site, decrypt it, and then re-encrypt it before sending it on to the browser. Security geeks have a term for this – it’s called a “man-in-the-middle attack,” and it’s not something you want to willingly allow on your PC. In order to do this, Superfish installs a self-signed trusted root certificate on the PC. That means Superfish has the same level of trust as, say, the VeriSign trusted root certificate that Microsoft bakes into your Operating System so you can safely interact with all the Web sites out there that have VeriSign certificates on them…for example, your banking institution, as most financial institutions I’ve seen use VeriSign certificates on their Web banking sites. (Are you frightened yet?)

But that’s not all. Superfish installs the same root certificate on every PC that it gets installed on. And it turns out that it’s not technically difficult to recover the private encryption key from the Superfish software. That means that an attacker could generate an SSL certificate for any Web site that would be trusted by any system that has the Superfish software installed. In other words, you could be lured to a Web site that impersonated your bank, or a favorite shopping site, and you would get no security warning from your browser. You try to authenticate, and now the bad guys have your user credentials. (How about now?)

Hopefully, you’re at least frightened enough to check to see if your system was one of the ones that Lenovo shipped with Superfish pre-installed. You can find that list at http://news.lenovo.com/article_display.cfm?article_id=1929. Again, it appears that the majority of the Lenovo systems on the list were consumer models, not business models. If you are one of the unlucky ones, you can find an uninstall tool at http://support.lenovo.com/us/en/product_security/superfish_uninstall

You should also note that security experts are divided as to whether simply running uninstall tools and deleting the root certificate are sufficient. Some have recommended a new, clean installation of Windows as the safest thing to do. Unfortunately, this may require you to purchase a new copy of Windows if you don’t have one lying around…as just re-installing from whatever recovery media may have come with your new PC will probably also re-install Superfish.

Meanwhile, Lenovo has stopped pre-installing Superfish, and is doing its best to control the damage to its brand. We wish them the best of luck with that – from what we’ve seen, they make some great products…and at least one really bad decision…

Scott Gorcester on ‘Money For Lunch’ Blog Radio

CEO, Scott Gorcester spoke about BYOD (Bring Your Own Device) this morning based off his book ‘The Business Owner’s Essential Guide To IT and All Things Digital’. Scott was featured in an interview on ‘Money For Lunch’ blog radio, hosted by Bret Martinez. Listen to his interview on demand here, his interview starts at the 37 minute mark.

If you’re interested in purchasing a copy of Scott’s book, please email Laura.Gorcester@www.manage-ops.com.

Choosing the Right IT Provider

A few months ago, we wrote about how business leaders could determine when it was time to use an outside IT vendor. (See “When Should an IT Leader Use a Vendor, Part 1” and Part 2.) Once the decision has been made to seek outside help, the logical next question is how to choose the right IT vendor. Before you begin that selection process, you need to assess your organization’s needs:

  • Do you have an in-house IT staff and just need a consultant for specialty work? Or do you need to outsource a broader spectrum of services, such as comprehensive help desk support, fixed fee monitoring and support services for your workstations and/or servers, and consulting services to help you establish future technology direction? A consultant may have different pricing approaches for different types of IT projects, while the broader spectrum of services is probably best handled via a fixed-fee monthly support contract.
  • What, exactly, are you looking for? Do you need a single project completed? Are you looking for design services, deployment services, post-deployment support, or some combination of the three? Do you want your vendor to provide a complete package consisting of hardware, software, and services, or only part of the solution? Will the project be built on premise, or do you want to go to the Cloud? IT providers frequently specialize in different aspects of the IT world, so make sure you have a talk with any company you are considering to determine if they can fulfill all of your needs, or if you will need multiple providers to achieve your end goal.

After you’ve determined your needs, you will want to identify IT providers that offer the services that you need. Some providers are very specialized, and others have boad offerings. You will want to do your due diligence by checking out the provider’s own Web site as well as supporting sites such as LinkedIn, Facebook, Twitter, etc. But don’t stop there – dig deeper and examine their credentials. Look for case studies, testimonials, and references. Ask if you can actually speak to the customers who are profiled in these case studies, testimonials, and references. If you’re looking for a comprehensive support agreement, ask to review the contract to make sure all of your needs are covered and that the proposed Service Level Agreement (“SLA”) meets your requirements. Some of the questions you’ll want to answer are:

  • How qualified is the provider’s staff? Are they certified with the vendors whose products they will be working on in your environment?
  • How big is the provider’s company? Size and reach matter – you don’t want to have a service emergency and discover that the only person who knows how to work on your systems is gone on vacation. On the other hand, if your organization is small, your business may be less important to a very large provider and you may get more attentive service from a smaller one.
  • What geographical areas does the provider cover? This is obviously important if your own organization operates in more than one area, but will also be important if you’re considering a potential move or business expansion.
  • Does the SLA include a guaranteed response time? More importantly, does that guaranteed response time meet the needs of your business? It might be nice to have a one hour guaranteed response time, but shorter guaranteed response times are likely to be more expensive…so if your business really doesn’t need that SLA, why pay for it?
  • If you’re signing a support contract, make sure you clearly understand what services are covered, what is excluded, and what your cost is for items that are excluded from coverage.

Did we miss anything that you have found to be important? Let us know in the comments.

The Year of Mobile Computing: BYOD Trends to Expect in 2015

Guest post by Jennifer Birch

Bring Your Own Everything

Photo Credit: Dennis Callahan via Compfight cc

As people become more mobile reliant, the trend toward “bring your own device” (BYOD) becomes more common in today’s highly technologically dependent world. In fact, Gartner research revealed that 50 percent of companies will require their staff to use their own devices for work purposes in 2017. “The benefits of BYOD include creating new mobile workforce opportunities, increasing employee satisfaction, and reducing or avoiding costs,” according to Gartner vice president David Willis.

With the continuous demand for mobile computing in the business sector, it’s important to know what’s next in this sector. In this post, let’s introduce you to the top BYOD trends to watch out for this year.

More Mobile Security Apps
Security will remain as the main concern that slows the widespread growth of mobile computing in the office. However, as the famous saying goes, “there’s always an app for that.” A mobile security application is one of the most important apps that each gadget owner should acquire. For companies, one of the major concerns is the safety of their servers and crucial business information that can be hacked easily, given that these devices can easily be stolen and accessed by anyone remotely. It’s best to follow some of the common tips for mobile data security such as installing security apps, deleting cache and history, and turning on the device’s access pin code system. [Editor’s note: Mobile Device Management systems such as Citrix XenMobile can offer organizations ways to enforce security policies, even on employee-owned devices.]

Rise of Wearables
Some of the much-awaited devices this year are in the form of wearables, particularly smart headsets such as Google Glass. Through its potential to provide augmented and virtual reality technologies, various industries are given the opportunity to work remotely, maximize innovative solutions, and acquire real-time data right at their eyes. “It [smartglasses] could provide access to repair manuals and larger schematics, helping engineers, technicians and architects to make more informed, quicker decisions,” Steve Pluta wrote in the news section of O2. As smartwatches have become powerful as well (with their ability to be standalone devices), it is not impossible that these gadgets will also be included in the next wave of BYOD technologies.

High mTech Demands by Employees
As stated previously, there will be an increase in the number of companies requiring their employees to use their own smartphones and tablets to work remotely. However, demand coming from their staff will also be apparent, such as the following:

  • The option to choose their own type of gadget.
  • Demand for a 4G connection.
  • Free access to work-related apps.
  • Pre-installed Cloud apps (such as Dropbox or iCloud), access to company Web site, and more.

Tracking Tools to Monitor Mobile Usage
Since there will be widespread adoption of mobile devices in the office, businesses will then have to control and monitor their usage. With the help of analytics tools, companies will have concrete insight into the content that their employees are accessing. Some may regard this action as a way to control their employees, limiting the activities they can partake of using their gadgets. However, experts say that applying a mobile monitoring tool must be discussed openly with colleagues to avoid any hurdle in the process.

BYOD has completely revolutionized the business sector, with its various advantages in terms of faster computing processes. Although security will remain to be of the utmost concern to most companies in making the shift to mobile processing, it will continue to grow as more devices are being produced that are focused on making work more efficient and cost-effective. What trend are you expecting to come up in BYOD this year?

Exclusive for ManageOps
@writtenbyjenni

NOTE: ManageOps welcomes the submission of guest posts on topics related to our own subject matter. The opinions expressed by the authors of guest posts are their own and do not necessarily represent the opinions of ManageOps. ManageOps also reserves the right to decline to publish submissions that we feel are not appropriate for our site.

WatchGuard e-Series End of Life

If you’re running a WatchGuard e-Series firewall appliance, please note that it will reach End of Life on December 31, 2015. Here’s what that means for you: First of all, when your current LiveSecurity subscription (and/or other Unified Threat Manager components) expires, you will not be allowed to renew it for another year. You can purchase a renewal that will expire on December 31, 2015, but the cost will not be pro-rated – you’ll have to pay for a full year of coverage, but you won’t get a full year of coverage. If you continue to run your e-Series appliance after December 31, you will be running without any support from WatchGuard – no more firmware updates, no more updates for the Gateway AV or WebBlocker functions (if you’re using those), and no hardware warranty coverage.

The good news is that WatchGuard has a trade-up program for existing customers that will allow you to purchase a new firewall appliance at a significantly discounted price. So our recommendation to you is that you:

  • Plan now to replace your e-Series firewall appliance on or before December 31. If your existing LiveSecurity subscription is due to expire sooner than December, then that’s probably the replacement date you should shoot for, rather than wasting money paying for a renewal when you won’t get your full money’s worth.
  • Contact ManageOps to get pricing for your trade-up options so you know what to budget for. We will then put you on our follow-up list and contact you with a quote roughly 60 days before your subscription expires so you can get your replacement unit ordered.

What’s Your Password?

Earlier this month, we posted a couple of articles on the state of cyber security. Of course, one of the biggest problems with cyber security is that too many people don’t take it seriously enough. Don’t believe me? Take a look at this:

In the words of cartoonist Walt Kelly (on Earth Day in 1971): “We have met the enemy and he is us.”

ManageOps Announces Cloud-Based VDI

ManageOps is pleased to announce the availability of Cloud-Based VDI as an option for Hosted Private Cloud customers. Historically, most customers have been well-served by Cloud desktops delivered from shared servers using Microsoft Remote Desktop Services and Citrix XenApp. However, there are some situations where this approach may fall short. For example, there are still some applications that will not run properly in a multi-user environment. There are also situations where a power user may need dedicated processor and RAM resources to run applications that require substantial resources and may cause “noisy neighbor” problems when run on a shared server platform that is servicing other users as well. Both of these situations can often be addressed by dedicating an Operating System instance per user. More information on the distinction between Cloud-Based VDI and other forms of Desktop-as-a-Service (DaaS) can be found in our blog post entitled Cloud-Based VDI vs. DaaS – Is There a Difference?

What this is NOT

We are not announcing the availability of Windows 7 or Windows 8.x desktops running in the Cloud. If you need a Cloud-based infrastructure that provides access to Windows 7 or Windows 8.x desktops, we will be happy to provide a proposal for a customized Cloud solution. Microsoft has chosen not to include these desktop Operating Systems in the Service Provider License Agreement (SPLA), meaning that service providers like ManageOps can only provide access to Windows 7 and Windows 8.x desktops under very specific conditions that must be evaluated and quoted on a case-by-case basis.

What this IS

ManageOps’s Cloud-Based VDI option provides a VDI user with a dedicated instance of Windows Server 2008 R2 or, optionally, Windows Server 2012 R2. We use Microsoft policies to change the “look and feel” of the desktop to the familiar Windows 7 or Windows 8 user interface. This approach allows us to maintain compliance with the Microsoft SPLA while still supporting applications that do not run well in a multi-user environment, providing dedicated processor and RAM resources to users whose needs demand it, and providing power users a greater level of administrative control over their own desktops than can be provided in a multi-user environment where a single user’s changes could adversely affect other users.

For more information, contact ManageOps at (425) 939-2700, email support@manage-ops.com, or click the “Request a Quote” button on this page.

Licensing Office in a Remote Desktop Environment – Updated

Update – January 19, 2015
After posting the last update a week ago, I spent more time rooting around the Microsoft Web site, and ended up in a relatively painful 45-minute chat session with a Microsoft “Licensing Specialist.” A large portion of that time was spent just trying to get said Licensing Specialist to understand the question I was asking. Ultimately, I had to give up on my attempt to get an answer as to why Microsoft still had a live link to a Volume License Brief that appeared to be out of date and that apparently contained information that was no longer valid…because the Licensing Specialist couldn’t get to the document in question. According to her, when she clicked on the link below, she received an error message stating that the document had been removed from the Microsoft Web site. As I write this update, the link to the 2009 Volume License Brief is still live, and I just verified that the document is still there. I will leave it to you to figure out why I can still get to it but she couldn’t. She offered to have a Microsoft manager call me the next day. It’s been a week now, and I have yet to receive that call. (It’s possible that the manager attempted to call me, but, if so, did not leave a voice mail message.)

In the absence of any other information at this point, my best advice is to assume that this Volume License Brief supersedes the information in the earlier one (even though the earlier one is still available on Microsoft’s Web site), and that, to be on the safe side, you should insure that, if you are accessing Office applications via RDS, the edition and version on your RDS server(s) match the licenses you have for your client devices.
…end January 19 update…

Update – January 12, 2015
A few days ago, Markus challenged my statement (see comment below) that it was permissible to access Office Standard via Remote Desktop Services if your client was licensed for Office Pro Plus, and that it was also permissible to access an older version (e.g., Office 2010 Pro Plus) via Remote Desktop Services if your client was licensed for a newer version (e.g., Office 2013 Pro Plus). I can state definitively that this was the case, as recently as November, 2009. This Microsoft Volume License Brief, originally published in 2007, and updated in November of 2009, contained the following graphic (click to enlarge):

OfficeAccessMatrix
This graphic clearly shows that it was permissible to access Office Standard from a client device licensed with Office Pro Plus, and that it was permissible to access an older version of Office from a client device licensed with a newer version. However, a later Volume License Brief suggests that this may have changed. I am attempting to get clarification from Microsoft, and will update this post again as I get more information.
…end Jan. 12 update…

Judging from the questions we continue to be asked, lots of people are confused about how to license the Microsoft Office Suite if you are accessing it via Microsoft’s Remote Desktop Services (a.k.a. Terminal Services) and/or Citrix XenApp. Hopefully, this will help clear up the confusion. We’ve also updated this post to include information about how to license the applications in a Cloud hosting environment.

First of all, it is important to keep in mind that desktop applications such as the Office Suite are licensed per device, not per user. According to the latest Microsoft “Product Use Rights” document dated April, 2014, a “Licensed Device” is “the single physical hardware system to which a license is assigned.”

That begs the question of what “assigned” means, and the answer – particularly for devices like thin clients, where you couldn’t install the application locally if you wanted to – is that you are on the honor system. You decide, in the privacy of your own conscience, which licenses you are assigning to which devices – with the caveat that, if you’re ever audited, you’d better be able to produce a license for every device people are using to run Office apps. You can reassign a license from one device to another, but not more often than every 90 days, unless it’s due to permanent hardware failure.

Once you’ve assigned each license you acquire to a device, you have the following rights (again quoting from the Product Use Rights document, with my commentary in italics):

  • You may install the software on the Licensed Device and a network Server.
  • Unless you license the software as an Enterprise Product or on a company-wide basis, you may also install the software on a single portable device. That would cover a user who, for example, had both a desktop PC and a notebook PC.
  • Each license permits only one user to access and use the software at a time. So, technically, it would be a license violation for someone else to run Office on your desktop PC while you’re in a hotel somewhere running it on your “portable device.”
  • Local use of the software running on the Licensed Device is permitted for any user. So it’s OK to let someone else use your desktop PC to run Office, as long as you’re not simultaneously running it on your “portable device.”
  • Local use of the software running on a portable device is permitted for the primary user of the Licensed Device. So, technically, it would be a license violation for you to let someone else run Office on your “portable device” under any circumstances.
  • Remote use of the software running on the Licensed Device is permitted for the primary user of that device from any device or for any other user from another Licensed Device. So if your Licensed Device is your desktop PC, it’s OK for you to use GoToMyPC or some similar remote access method to access and run that copy of Office, using whatever kind of client device you want – including, say, an iPad. However, any other user could not remotely access your desktop PC to run that copy of Office unless they were doing so from another Licensed Device.
  • And now the most important point relative to the subject at hand… Remote use of the software running on a network Server is permitted for any user from a Licensed Device. A Remote Desktop Server falls under the definition of a “network Server.” So any user who is accessing Office via Remote Desktop Services must be doing so from a Licensed Device.

In other words, if you can walk up to a device and use it to access a Remote Desktop Server and run Office, you must have an Office license for that device. It doesn’t matter whether that device is a PC or laptop that has the Office bits installed on its local hard drive, or whether it is a thin client device that only knows how to connect to a XenApp server, you need to have “assigned” a license to that device.

It’s also important to note that all of the above came from the Product Use Rights document for Microsoft Volume Licenses. You do not, never have had, and probably never will have the right to access Office on an RDS or XenApp server from a device that has an OEM Office license installed on it. If your PC or laptop came from the manufacturer with Office pre-installed on it, then you have an OEM license, and you do not have “network storage and use” rights. There is an excellent blog post over on the Microsoft SMB Community Blog that explains this in detail. Yes, it’s an old post (from July, 2005). No, the policy hasn’t changed.

Things get a bit more complicated when you move to the Cloud. For example, if you are a VQOffice® customer, and you want to run Office apps on our cloud servers, we can, of course, bundle the Office licenses into your monthly fee under our Microsoft SPLA (“Service Provider License Agreement”). But what if you already own volume licenses for Office? According to the Product Use Rights document, we can use your licenses “provided all such Servers and other devices are and remain fully dedicated to your use.” Given the highly virtualized environments of nearly all Cloud hosting providers (including us), that’s going to drive the cost of the solution up significantly unless you have enough users to justify dedicating hardware in our data center just for your use. For most small businesses, it will be less expensive to pay us for the use of our SPLA licenses than to pay us for dedicated hardware so you can use your own licenses.

What about Office 365? Office 365 is governed by a completely different use rights document – the Online Services Use Rights document. If you read through that document, you will find that, under the E3 plan for example, each user has the rights to activate the Office software on up to five devices, which is a pretty good deal. You will also find the following statement: “Each user may also use one of the five activations on a network server with the Remote Desktop Services (RDS) role enabled…” At first blush, you might think that means you could use your Office 365 E3 licenses to cover running Office apps in our Cloud hosting environment – and you would be right, provided that you’re running on dedicated hardware. So, basically, the same rules apply to Office 365 licenses as apply to volume licenses. We’d be delighted if the rest of the world added their voices to ours to try to get that policy changed.

Disclaimer: I do not work for Microsoft, nor do I define their license terms, which are subject to change, particularly when new product versions are released. I have, however, worked with them for a very long time, and had lots of discussions about what is, or is not, legal under the terms of various license models. The foregoing is my own interpretation of information that is publicly available on the Microsoft Web site – and I have helpfully provided you with links to that information. I highly recommend that, if you have any questions, you download the relevant Product Use Rights document and read it for yourself.