09.04.2015 Views

Government Security News

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ness data including, critically,<br />

accessing the business intranet.<br />

Your IT administrator no longer<br />

has to worry about what you<br />

do personally. Hence, half of the<br />

problem is solved. And for an<br />

added benefit, the user’s privacy<br />

in using the personal OS can also<br />

be assured.<br />

GSN: How is it used – how would<br />

I go back and forth between business<br />

and personal computing?<br />

LH: It’s easy. You just click the<br />

switch icon to move to the other<br />

OS. Takes about 3 seconds. This<br />

allows the open OS to hibernate<br />

and activates the second OS. We<br />

also provide optional password<br />

authentication. It’s just like opening<br />

an app, and entering a password.<br />

GSN: Do you think WorkPlay<br />

Technology is a game-changer, a<br />

real difference-maker?<br />

LH: Well, you can buy two mobile<br />

devices or laptops if you<br />

want, use one for business and<br />

one personally. Of course even<br />

then you’d have to keep both<br />

open or constantly boot up.<br />

But using just one device instead<br />

of two? Yes it changes the game<br />

in several ways: So long as you<br />

use the same resources, like one<br />

kernel, a software method like<br />

containers or hypervisors is susceptible<br />

to malware that gains the<br />

elevated privileges to access the<br />

entire device. Is this a real threat?<br />

Ponemon just issued a new report<br />

and 38% of the respondents<br />

found container and other security<br />

like complex firewalls still<br />

vulnerable. In point of fact, over<br />

the last year, we have been reading<br />

about the vulnerabilities of<br />

these methods constantly. Moreover,<br />

our own technical people<br />

discovered multiple vulnerabilities<br />

in existing mainstream products<br />

when we were evaluating<br />

their compatibility with Work-<br />

Play Technology. So I’ll say it as<br />

a rhetorical question - - why not<br />

take half the risk away?<br />

GSN: Why wouldn’t WorkPlay<br />

Technology replace existing dual<br />

persona solutions?<br />

LH: Because you still would often<br />

want those solutions inside<br />

at least the business OS. Think<br />

of WorkPlay Technology as a<br />

unique, secure and cost-effective<br />

method to provide truly two devices<br />

in one. Everything else is<br />

the same. The apps, the security,<br />

all the same. You may still want<br />

19<br />

other solutions to protect data inside<br />

an OS. And these days, it is<br />

more important than ever to protect<br />

the end user device as much<br />

as you can.<br />

GSN: Why is that now increasingly<br />

important?<br />

LH: It’s evidently become the<br />

path of least resistance, often<br />

through phishing and spearphishing.<br />

While SONY received<br />

extensive publicity for its data<br />

breach, but meanwhile, we’ve<br />

lost untold amounts of government<br />

data through cybercrime<br />

like Operations Pawn Storm and<br />

Cleaver. Unwittingly, government<br />

and military personnel introduced<br />

malware by simply clicking<br />

“Like” on Facebook, exposing<br />

government data. Moreover,<br />

cybercrime like Pawn Storm has<br />

been going on for seven years, say<br />

the reports. Social media are also<br />

being targeted more and more:<br />

Facebook and YouTube were the<br />

sources of several large breaches<br />

last year. In the case of the most<br />

publicized enterprise breaches,<br />

like Target and Home Depot,<br />

over a hundred million records<br />

were exposed through a phishing<br />

attack. I’m not saying they all<br />

More on page 41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!