Government Security News
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
ness data including, critically,<br />
accessing the business intranet.<br />
Your IT administrator no longer<br />
has to worry about what you<br />
do personally. Hence, half of the<br />
problem is solved. And for an<br />
added benefit, the user’s privacy<br />
in using the personal OS can also<br />
be assured.<br />
GSN: How is it used – how would<br />
I go back and forth between business<br />
and personal computing?<br />
LH: It’s easy. You just click the<br />
switch icon to move to the other<br />
OS. Takes about 3 seconds. This<br />
allows the open OS to hibernate<br />
and activates the second OS. We<br />
also provide optional password<br />
authentication. It’s just like opening<br />
an app, and entering a password.<br />
GSN: Do you think WorkPlay<br />
Technology is a game-changer, a<br />
real difference-maker?<br />
LH: Well, you can buy two mobile<br />
devices or laptops if you<br />
want, use one for business and<br />
one personally. Of course even<br />
then you’d have to keep both<br />
open or constantly boot up.<br />
But using just one device instead<br />
of two? Yes it changes the game<br />
in several ways: So long as you<br />
use the same resources, like one<br />
kernel, a software method like<br />
containers or hypervisors is susceptible<br />
to malware that gains the<br />
elevated privileges to access the<br />
entire device. Is this a real threat?<br />
Ponemon just issued a new report<br />
and 38% of the respondents<br />
found container and other security<br />
like complex firewalls still<br />
vulnerable. In point of fact, over<br />
the last year, we have been reading<br />
about the vulnerabilities of<br />
these methods constantly. Moreover,<br />
our own technical people<br />
discovered multiple vulnerabilities<br />
in existing mainstream products<br />
when we were evaluating<br />
their compatibility with Work-<br />
Play Technology. So I’ll say it as<br />
a rhetorical question - - why not<br />
take half the risk away?<br />
GSN: Why wouldn’t WorkPlay<br />
Technology replace existing dual<br />
persona solutions?<br />
LH: Because you still would often<br />
want those solutions inside<br />
at least the business OS. Think<br />
of WorkPlay Technology as a<br />
unique, secure and cost-effective<br />
method to provide truly two devices<br />
in one. Everything else is<br />
the same. The apps, the security,<br />
all the same. You may still want<br />
19<br />
other solutions to protect data inside<br />
an OS. And these days, it is<br />
more important than ever to protect<br />
the end user device as much<br />
as you can.<br />
GSN: Why is that now increasingly<br />
important?<br />
LH: It’s evidently become the<br />
path of least resistance, often<br />
through phishing and spearphishing.<br />
While SONY received<br />
extensive publicity for its data<br />
breach, but meanwhile, we’ve<br />
lost untold amounts of government<br />
data through cybercrime<br />
like Operations Pawn Storm and<br />
Cleaver. Unwittingly, government<br />
and military personnel introduced<br />
malware by simply clicking<br />
“Like” on Facebook, exposing<br />
government data. Moreover,<br />
cybercrime like Pawn Storm has<br />
been going on for seven years, say<br />
the reports. Social media are also<br />
being targeted more and more:<br />
Facebook and YouTube were the<br />
sources of several large breaches<br />
last year. In the case of the most<br />
publicized enterprise breaches,<br />
like Target and Home Depot,<br />
over a hundred million records<br />
were exposed through a phishing<br />
attack. I’m not saying they all<br />
More on page 41