{"id":14816,"date":"2019-03-12T10:30:05","date_gmt":"2019-03-12T18:30:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/03\/12\/news-8565\/"},"modified":"2019-03-12T10:30:05","modified_gmt":"2019-03-12T18:30:05","slug":"news-8565","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/03\/12\/news-8565\/","title":{"rendered":"Apple\u2019s Box security scare shows the risk of shadow IT"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/02\/fight-shadow-100787429-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Tue, 12 Mar 2019 10:25:00 -0700<\/strong><\/p>\n<p>Until enterprise IT truly gets to understand that its own internal systems need to be as easy to use as any iOS app and as easy to learn as an iPhone, potentially damaging data breaches will take place, threatening business confidentiality. Apple is not immune.<\/p>\n<p>The news is that information from some of the world\u2019s biggest names in business \u2013 including Apple, Edelman and Discovery Channel \u2013 could have been accessed through Box Enterprise, which offers companies bespoke company name-based file archiving and sharing services using this URL construction:<\/p>\n<p><em>https:\/\/&lt;companyname&gt;.app.box.com\/v\/&lt;filename&gt;<\/em><\/p>\n<p>The problem \u2013 according to a report on <a href=\"https:\/\/www.adversis.io\/research\/pandorasbox\" rel=\"noopener nofollow\" target=\"_blank\">adversis.io<\/a> \u2013 is that files stored on the service were liable to brute force attacks. This means it is possible to guess file names and try to access them, apparently thousands of files (including confidential data) could be accessed in this way.<\/p>\n<p>To be fair, Apple employees sharing documents with others using public Box Enterprise links weren\u2019t using an unauthorized application to do so \u2013 this was an officially-used internal Apple tool.<\/p>\n<p>Neither is Box to blame. The company took rapid action to remind users with best practise security advice very swiftly after the story appeared and says it is also <a href=\"https:\/\/twitter.com\/levie\/status\/1105180044538929152\" rel=\"noopener nofollow\" target=\"_blank\">working to fix this problem<\/a>.<\/p>\n<p>Box itself had previously <a href=\"https:\/\/community.box.com\/t5\/Using-Shared-Links\/Securing-Shared-Links\/ta-p\/61843\" rel=\"noopener nofollow\" target=\"_blank\">warned<\/a> users that URLs could be guessed and advised administrators to limit sharing to \u201cpeople at your company\u201d, and to regularly check for public\/open links. It even offers tools to create non-guessable links to content.<\/p>\n<p>All the same, the scenario shows that convenience and apathy are strong bedfellows, making the argument that good security advice isn\u2019t always good enough to ensure good security practice.<\/p>\n<p>It\u2019s the BYOD\/Apple renaissance story all over again, of course.<\/p>\n<p>Just as incoming employees <a href=\"https:\/\/www.computerworld.com\/article\/3269356\/apple-has-become-an-hr-issue-for-enterprise-it.html\" rel=\"noopener\" target=\"_blank\">expect to be able to use Apple kit at work<\/a>, they also expect the software solutions they use to be accessible and intuitive.<\/p>\n<p>That\u2019s fine if your company has vetted and approved such use under company security policy, but what about the apps you haven\u2019t checked?<\/p>\n<p>It\u2019s important to coalesce your solutions around where your people are.<\/p>\n<p>After all, there are some applications employees just won\u2019t live without. For example, over half of deskless workers use messaging apps like WhatsApp and Messenger for work-related activity on a daily basis, but <a href=\"https:\/\/www.hrdive.com\/news\/study-employees-use-messaging-apps-for-work-without-hrs-knowledge\/546829\/\" rel=\"noopener nofollow\" target=\"_blank\">less than one-in-five<\/a> (16%) of them had informed HR of this use.<\/p>\n<p>The same logic applies across the application matrix.<\/p>\n<p>Mobile employee or in the office, most workers will use the solutions they find the most intuitive in preference to more complex apps \u2013 just because your enterprise offers a word processing tool that does everything doesn\u2019t mean much at all if employees have identified an alternative solution that transacts the same task faster.<\/p>\n<p>From their point of view, their time may be your money, but their time is precious, too, and the drive to ever increasing business productivity means stressed workers will seek out and use such shortcuts.<\/p>\n<p>iPhone-using employees know Apple\u2019s stores usually offer an <a href=\"http:\/\/www.applemust.com\/apple-ceo-tim-cook-speaks-at-cisco-live-confirms-enterprise-focus\/\" rel=\"noopener nofollow\" target=\"_blank\">\u2018App for that\u2019<\/a>.<\/p>\n<p>Empowering strong security policy requires a realistic approach.<\/p>\n<p>Your employees are going to use solutions that they are used to, so it makes sense for security teams to vet those in order to offer strong security advice to help make sure what happens on social media stays on social media \u2013 and that enterprise secrets never, ever make it there. The same applies to any other service.<\/p>\n<p>It\u2019s not sufficient to dispense an authoritarian, top-down selective approach to employee choice \u2013 it\u2019s more essential, and more useful, to provide accurate risk assessment, best practise advice and to block some of the worst security offenders (including surveillance capitalist networks) from your internal networks.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3356176\/apple-s-expanding-enterprise-ecosystem.html\">MDM<\/a>, sandboxing content, efficient file-sharing controls, geo-location of assets and even <a href=\"https:\/\/www.oracle.com\/cloud\/cloud-threat-report\/?source=:ex:nc:::RC_WWMK180119P00044:OracleKMPGThreat&amp;SC=:ex:nc:::RC_WWMK180119P00044:OracleKMPGThreat&amp;pcode=WWMK180119P00044\" rel=\"noopener nofollow\" target=\"_blank\">AI protections across intranet and internal company networks<\/a> may help prevent and\/or identify poor security practise.<\/p>\n<p>However, so long as the systems you provide are harder to use than the many highly popular publicly available alternatives, you\u2019re always going to have a shadow IT problem \u2013 and the least you can do for those services your company does support is read the small print rather than assume everything is beautiful straight out of the box.<\/p>\n<p>Please follow me on<em>\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3359368\/apple-s-box-security-scare-shows-the-risk-of-shadow-it.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/02\/fight-shadow-100787429-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Tue, 12 Mar 2019 10:25:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Until enterprise IT truly gets to understand that its own internal systems need to be as easy to use as any iOS app and as easy to learn as an iPhone, potentially damaging data breaches will take place, threatening business confidentiality. Apple is not immune.<\/p>\n<h2><strong>Apple and the human interface<\/strong><\/h2>\n<p>The news is that information from some of the world\u2019s biggest names in business \u2013 including Apple, Edelman and Discovery Channel \u2013 could have been accessed through Box Enterprise, which offers companies bespoke company name-based file archiving and sharing services using this URL construction:<\/p>\n<p><em>https:\/\/&lt;companyname&gt;.app.box.com\/v\/&lt;filename&gt;<\/em><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3359368\/apple-s-box-security-scare-shows-the-risk-of-shadow-it.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10480,10554,714],"class_list":["post-14816","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-ios","tag-mobile","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14816"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14816\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}