Beware the pod people

Are iPods really as innocent as they seem? Some believe that they pose a significant security risk to the organization. Here’s what you can do about it.

The recent buzz about security threats posed by iPods to corporations has reinforced the need for IT managers to treat these devices like any other removable media that employees with malicious intent can use to extract sensitive data.

Following the suggestion recently made by a security company that iPods be banned from the workplace until proper protection is in place, and the emergence of a proof-of-concept iPod virus, it would seem that iPods pose a particularly high risk to corporations that let employees wander into work with these devices strung to their ears. Those same devices that entertain workers during their commute can be used to copy personal or financial data, intellectual property and other sensitive information from corporate PCs, often without a trace. The idea of stealing corporate data with an iPod has gained so much attention lately that it’s even been given its own term: slurping.

“If you see someone walking in the door with an iPod they don’t look like a threat, but to me I see the ability to download reams of files, and it might just look like they’re downloading music,” says Jim Hereford, CEO of NextSentry, which suggested the iPod ban. “We’re not saying companies shouldn’t allow iPods, but they better have endpoint security on their desktops.” Endpoint security technology blocks information that’s been deemed sensitive from being copied onto removable media, e-mailed or printed.

But others say iPods pose no more risk of corporate data theft than a cell phone that can snap a photo of a computer screen or a thumb drive that slides into a shirt pocket. The issue is that organizations need to realize that iPods should be treated accordingly.

“Devices such as iPods and other MP3 players are basically storage devices; some can store substantial amounts of data and are innocuous enough that their presence is almost unnoticed in our daily lives,” says Tom Scocca, investigator and global security consultant for a large provider of microprocessor manufacturing technology. “Controls targeted at these devices should be based not on the type of device, but on the risk that companies are willing to accept by allowing any type of external storage device into the environment.”

iPods stand out from most other types of removable media because their intended use – to play music and videos – is entertainment, whereas a thumb drive, for example, is clearly designed to copy files.

“If you’re listening to a book or music, that’s not seen as a threat,” says Benjamin Powell, a network operations manager who formerly worked as a security analyst at a financial services firm. But organizations need to lay out clear policies regarding the type of corporate information that can and cannot be copied onto iPods, and even back it up with software that implements those policies, he says.

Software that secures the endpoint is one option, says Scocca, but requires a lot of upfront work to ensure that the policies set regarding what can and cannot be copied don’t interfere with an employee’s ability to do her job. Instead, educating employees is the most effective thing companies can do, he says.

“We have to rely on our trusted employees,” agrees David Jordan, CISO at Virginia’s Arlington County. “The user is a very powerful antitheft tool; we keep them aware. Every day when they log on they agree to abide by our policies.” However, Jordan adds that if an employee comes in with malicious intent, “there’s not much we’re able to do about that except prosecute, and we have had people go to jail for breaking the rules.” Apple officials did not respond to inquiries asking if the company plans to add security features to iPods.

– by Cara Garretson

QuickLink: 076574


Four ways to prevent theft by iPod Educate users.

  • Make corporate policies regarding the use of removable media clear by including “iPod” and “MP3 players” in the text.
  • Consider endpoint security products that learn what the organization deems sensitive and block that data from being copied without authorization.
  • Consider policy-based encryption products that can automatically encrypt data based on parameters such as where it is being copied to.
  • In some organizations it may make sense to ban the use of iPods by employees, such as traders, who come into close contact with sensitive data.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

ADaPT connects employers with highly skilled young workers

Help wanted. That’s what many tech companies across Canada are saying, and research shows...

Unlocking Transformation: IoT and Generative AI Powered by Cloud

Amidst economic fluctuations and disruptive forces, Canadian businesses are steering through uncharted waters. To...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now