The Wikileaks story continues to roll on around the world but as the story now moves its focus to the website founder Julian Assange, questions are now beginning to be asked about how the information was able to have been stolen in the first instance.
Only this week have the US military blocked the use of removable media in their computers, something business and corporations did several years ago.
I spoke to security expert James Watts from Zinstall, the data protection lead of their DiCOP (Digital Content Protection) unit. He had some interesting thoughts on overall ICT security within businesses and governments.
"This outbreak is not surprising or sudden." He said. "It is simply another blow in a string of leaks - and subsequent scandal – from military and governmental networks. And it is definitely not the last one."
"Traditional defense systems of notable manufacturers (such as Symantec, McAfee, CheckPoint), same antiviruses and firewalls installed in every organization and personal computer have not failed. They were simply created with a different concept, developed in the early 2000s, with the primary goal of protecting from an external attacker trying to penetrate the system. It is more fitting to say that the actual modus operandi on which these tools are based was the one that failed."
He went on to detail the three main categories of defence against information leaks...
It's interesting to note with the first category that this feature is available in software within Windows 7, though as we have yet to see the first service pack for this operating system, many businesses and certainly many governments are yet to switch over to the new OS.
It remains to be seen if recent events will change the policies of these organisations who normally wait for this first service pack release. Will future Windows versions be adopted sooner after their release than is currently the case? Only time will tell on this one.
Watts has some simple advice for companies though and it's the mantra for Zinstall's own security products. "The motto is simple: protect all digital content in the organization, including all files of all types – while maintaining complete transparency for the users, keeping data flow unobstructed and allowing full streamlined collaboration between the employees. The leak source can try carrying the files out on a USB drive, burning them onto a CD, transferring them to a smartphone, sending them by email – but he will not be able to use that leaked content outside the organization. Of course, a disgruntled employee will still be able to write down some information on a simple piece of paper – but leaking many thousands of classified documents, reports and many kinds of digital content will be impossible."Advertisement
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.