Welcome to the world of Electronic Recycling in Dublin, Ireland. Our News will mostly include articles and information on the world of recycling with a specific attention to recycling of Electronic Waste and Data Security.

Searching the blog under "Data Security, Exporting or Donating" will bring up a list of related articles

Friday, August 28, 2009

Tiny storage devices pose biggest data security risk

Companies need to be aware of how easily sensitive data can be stolen by employees wielding high-capacity USB devices, writes KARLIN LILLINGTON in the Irish Times.

THE BIGGEST risk to your company may be no larger than your thumb. With high-capacity storage devices such as USB thumb drives small enough to fit into the tiniest pocket, companies need to be aware of how easily sensitive company data can go walking, according to a leading Irish forensic investigDator.

Recent data theft court cases, including the just-settled Green Isle Foods suit in which four employees were accused of removing sensitive data on a USB drive, underline how difficult it can be to know exactly where data is going, says Andy Harbison, director and IT forensic lead in accountancy firm Grant Thornton's forensic and investigative services unit.

Harbison says the most common method of removing company data - a practice he says is "rife" in Irish businesses - is by a USB "key" or "thumb" drive, or by similar small storage devices, including iPods.

The use of iPods and other MP3 music players - which are essentially portable hard drives - has become so common in data theft cases that the phenomenon is now referred to as "podding".

"We had one of those cases last year," says Harbison. "A bunch of stuff put on a [ iPod] Nano."

He believes firms do not usually notice when data theft is taking place and, as it is easy to do, "could be more the norm than not". Data theft tends to be a white-collar, professional crime that takes place in standard situations. "There are particular times when people commit data theft, for example, when they are browned off at work, or when they are about to leave the company," Harbison says.

The data often stolen is used as the basis for a new job or company, or for the next project for the person or group stealing it.

For example, Harbison points to a case in Ireland where a software development consultancy stole the software it was working on for a client as the basis for a pitch for new clients.

Fortunately, the perpetrators e-mailed each other discussing their plans to steal the software, making it easy to convict them, he says.

In another case, a group of managers took sensitive intellectual property from a company for which they were working for a full six months before they planned to leave.

A common item to steal is client lists, in preparation for setting up a competing company.
Sometimes people take personal data on others, out of "prurient interest".

Thumb drives featured in several of these cases and are so common and cheap that they have become ubiquitous in offices, says Harbison. And while they are extremely useful, they are a nightmare for fraud investigators. "These things are an unqualified menace," argues Harbison.

"They were only invented in 2000 or so, and at first only held eight megabytes of data. But now you can get them up to 256 gigabytes. You forget how much data can be stored on these things."
A single gigabyte is enough to hold the print equivalent of a 100m shelf of books, he notes.
Most companies lack policies for managing storage devices, according to Harbison, with only the largest companies generally having a comprehensive security approach to what employees can bring in, attach to work PCs, and carry out the door again.

Even digital cameras can be used for transferring files on to memory cards.

Webmail - which is effectively a storage medium on the internet directly connected to company PCs - is also a potential security hazard, and businesses need to weigh up the usefulness of having such accounts with the potential for abuse.

Harbison recently had a case where an employee was transferring sensitive private data from the company to her webmail account, but investigators were able to trace the activity from the cache (memory) of webpages left on her web browser.

If forensic investigators can get hold of the storage devices or computers used to commit fraud, it is not generally too difficult to compile enough evidence to convict the perpetrators, says Harbison.

Traces of information from the originating computer are transferred with files to thumb drives and other storage devices, and information is often left in browser caches.

It is also still extremely difficult to wipe the files from hard drives completely - even for the adept thief.

Forensic investigators can pull residual information from a drive even if it has been wiped half a dozen times.

The problem is catching the thieves in the first place, especially when they know what they are doing with computers.

"About half the cases I do are IT guys, because they have the keys to the kingdom," says Harbison.
"They have the knowledge, the liberty, and the privilege to access data. A manager and [ IT administrator] working together are the most damaging cases, as they can get access to just about everything. With the IT guy - give him admin privileges and the next thing, he's raiding the chief executive's e-mail."

He says it is best to have IT administrators "completely ignorant about everything else that is going on in a company", and to never allow a personal storage device on to a company network.

Harbison, who previously headed up the IT forensics units at Ernst & Young and Deloitte in Ireland, says he enjoys the challenge of unearthing evidence.

"It's a puzzle and a game," he says, adding that only one drive has totally defeated him, although a recent IT specialist in Cork almost got away too after he carefully destroyed evidence. A mix of circumstantial and primary evidence did him in, however.

About one-third of cases now display some attempt to destroy evidence. "It's because of bloody CSI on TV!" Harbison laments.

"It's become a major headache for us, because people expect a forensic investigation and know more about what we are able to do."

Link to the article in the Irish Times Here

********************************************************************

http://www.electronic-recycling.ie/









Wednesday, August 12, 2009

TENS of thousands of Irish students are being left behind in the digital revolution

Extract from an Irish Independent article on Monday 10th August 2009

TENS of thousands of Irish students are being left behind in the digital revolution, and are losing out on skills to score the top jobs of the future, according to a confidential new report.

Years of under-investment has meant that
Ireland has been "leapfrogged" by other countries as young people face a new era of fierce global competition for hi-tech jobs.

Surveys have already shown that much of the Information and Communications Technology (ICT) equipment in Irish schools is years old.

The report recommends
At least one laptop in every classroom, starting in infant and first-year primary school classes from this year.
Five desktop computers in every classroom, starting in 2010.
A Virtual Learning Environment network set up in the coming academic year at a cost of €5m.
Teacher training at the core of an investment plan for ICT integration in schools.

At the moment, usage of computers in Irish schools falls well below the
EU average. And Ireland ranks at the very bottom in Europe when it comes to teachers' satisfaction with ICT infrastructure in schools.

See the full article
here


Computers for Irish Schools was set up in 2008 to route computers, which are not quite ready for the recycling bin, to Irish Schools. If you are disposing of office IT equipment contact http://www.cfis.ie/ to see if some of that equipment is suitable for the program and can be donated to your local school