KNOX Vulnerabilities

There is a lot of buzz going around the discovery that Samsung’s KNOX container has been found to have some vulnerabilities, as reported by the Wall Street Journal Tuesday and  PC World yesterday.  While it is very poor timing for Samsung, considering CES, the huge technology show in Vegas, starts next week, we are confident that Samsung is dedicated to security and will find a fix quickly.

What exactly is the concern? The vulnerabilities found by Israel’s Ben-Gurion University of the Negev indicate that Knox software (when used on a  Samsung Galaxy S4 or Note 3) could allow malicious apps to eavesdrop on data transferred within the secure environment.  The WSJ reports :“Samsung officials told the Journal that the vulnerability was found in developer phones that weren’t “fully loaded with the extra software that a corporate client would use in conjunction with Knox,” the paper reported. So far, the Knox vulnerability has only been discovered on the Galaxy S4.”

The PC World article compared KNOX to our TouchDown, since both are designed to keep data secure – so what does all this mean and how does it work?  TouchDown was specifically designed to keep data secure against this type of data breach.  It keeps corporate data secure through encryption and by keeping it ‘sandboxed’ away from a users personal data on their device (smartphone, laptop, tablet).  It works directly with ActiveSync Exchange and keeps email, contacts, calendar and notes data secure when kept within TouchDown.  Meanwhile Samsung’s KNOX creates a container around several third party apps, with the purpose of keeping data within those apps separate from app data not inside the KNOX container.  The security breach discussed  in the article regards the potential security breach of the KNOX container itself, meaning malware could have access to apps inside the container.  If there are apps inside the container that are not secure, they could potentially be breached. Luckily, TouchDown users can breathe easy, since even if a malware attack did get past the KNOX container it would not be able to breach TouchDown data. So whether you are using  TouchDown in or out of the KNOX container on a Samsung device, your data will remain secure and separate from other data on your device.  If you’re not using TouchDown…what are you waiting for??

Encrypted Email in TouchDown

More and more people are using encrypted email as news about the NSA watching our email and hackers stealing our personal information loom large.  We take the encryption and security of your information very seriously here at NitroDesk, which is why our TouchDown email app uses AES-256 encryption.

SSL and TLS are the main tools that provide the majority of security in the transmission of data over the Internet today. Although these are cited as being “secure,” there is actually quite a range in the level of security that is provided, depending on what encryption technique or cipher is utilized. Like any software, some of these encryption tools are quite weak, while others are very secure.

When choosing an encryption tool for TouchDown, AES  (Advanced Encryption Standard) was the clear and obvious choice for its speed and high level of security. It is based on the Rijndael cipher developed by Belgian cryptographers,  Vincent Rijmen and Joann Daemen.   AES was standardized in 2001 after a 5 year review, and is currently one of the most popular algorithms used in symmetric key cryptography (which, for example, is used for the actual data transmission in SSL and TLS.)   It is also the “gold standard” encryption technique; many security-conscious organizations require that their employees use AES-256 (256-bit AES) for all communications.

AES is based on a design principle known as a substitution-permutation network, and is considered one of the faster encryption methods.  AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. AES was first available in Open SSL starting in 2002, and was the basis of most SSL services in UNIX and Linux environments.    AES is FIPS (Federal Information Processing Standard) certified.

At NitroDesk we recommend ensuring that your server is SSL-enabled, and never accessible through non-SSL connections. TouchDown utilizes HTTPS/SSL for communications with the server when the server is configured for SSL encryption, and utilizes AES-256. This ensures that your information cannot be compromised in transit between your device and the server.  Is your information secure on your device?

Remotely wiping your data through TouchDown

Did you know that TouchDown supports the remote wipe command which may be issued by an administrator or a user in the event that the device has been lost or stolen?  This remote wipe process deletes all the corporate data held inside TouchDown as well as any attachments under its control.

laptop theft

Image from nydailynews.com

More on mobile security and secure email

More interesting data from http://www.secnap.com/support/whitepapers/laptop-loss-costs.html indicates laptop security needs to be taken seriously.

In a recent Ponemon study, participating organizations reported that in a 12-month period 86,455 laptops were lost or otherwise went missing. In another study, 53 percent of surveyed mobile professionals carry confidential company information, 65% of those who carry it don’t take steps to protect it.

According to an earlier Ponemon Institute study (conducted independently and sponsored by Intel), The Cost of a Lost Laptop, the average value of a lost laptop is a staggering $49,246.  And what is the cost to YOU if either your  personal information is stole or if you are the one who loses your corporations sensitive data?

Secnap.com reported some interesting findings from The Billion Dollar Lost Laptop Problem report:

  • Out of the 263 laptops per organization that are lost or go missing, on average just 12 laptops were recovered.
  • Forty-three percent of laptops were lost off-site (working from a home office or hotel room); 33 percent lost in transit or travel; and 12 percent were lost in the workplace.
  • Twelve percent of organizations said they don’t know where employees or contractors lose their laptops.
  • Although 46 percent of the lost systems contained confidential data, 30 percent of laptops lost had disc encryption, 29 percent had backup, and just 10 percent had other anti-theft features.
  • Industries that experience the highest rate of laptop loss are education and research; health and pharmaceuticals were next, followed by the public sector. Financial services firms had the lowest loss rate.
  • Laptops with the most sensitive and confidential data are the most likely to be stolen. However, these laptops are also more likely to have disc encryption.

Or take an incident that happened last year, when a worker from Boston Children’s Hospital went to Argentina and had her Laptop stolen at a conference. The laptop was password-protected but not encrypted. A file containing patient information had been sent to the laptop as an email attachment. Even though the file was not saved to the laptop’s hard drive, it was still on the laptop as an email attachment at the time of the theft, exposing over 2000 patient’s medical information. Is your email secure?

How do you protect your data on your laptop?  What is your security plan if it is stolen?