Tuesday, 23 December 2014

Dropbox and Office 365: a match made in heaven?

Dropbox and Office 365: a match made in heaven?


Recently, the CEO of Dropbox announced that the cloud storage system had reached a total of 200 million users, including 4 million businesses. Drew Houston also announced that the company was keen to increase the number of Dropbox business users. Microsoft’s OneDrive is a similar service, meaning that Dropbox and Microsoft have long been seen as competitors, but changes have now been announced that show a very different reality.


Dropbox and Microsoft working together


Despite offering very similar services, Microsoft and Dropbox have chosen to work together to the benefit of both companies. Users of Dropbox and Office 365 will now find that the two work seamlessly together. The change is said to have ‘broken down walls’, and will increase ease of use and productivity for mobile workers.


Changes to the Dropbox app


The Dropbox app for mobile phones now features Microsoft Office integration. Users will be able to edit Office documents and files straight from Dropbox on their tablet or phone. The same is possible in reverse, with mobile workers able to use files that are stored in their Dropbox straight from their mobile Office applications. This functionality is available on both iOs and Android devices. Users, of course, will still be able to use OneDrive instead of Dropbox if that’s their preferred cloud storage system.


The importance of seamless connectivity


Microsoft’s CEO has said that “people need easier ways to create, share and collaborate regardless of their device or platform”, indicating that many companies will benefit from working closer together and not competing. As a result, Dropbox and Microsoft will be extending their partnership to offer the same connectivity for Windows phones and for PC and browser-based use in early 2015.


For mobile workers, these changes are sure to make life easier. As more and more devices and apps work seamlessly together, it will become easier than ever to upload and download files, make use of cloud computing and conduct meetings and presentations. Users will no longer need to circumnavigate restrictions, and will not be forced to use a certain service or provider. They can make their own choices, to suit their individual needs.



Dropbox and Office 365: a match made in heaven?

Monday, 15 December 2014

The Linux Turla worm

The Linux Turla worm


There is a common misconception that Linux systems are secure “by default”, and whilst it’s true that the operating system of user and file permissions is a robust model, it’s a dangerous mistake to assume that a system is secure just because it’s running Linux.


If you’re thinking right now “I’m a Windows business, this doesn’t affect me…” then think again. Linux is ubiquitous as a web server, DNS server and email server, and is widely used in cloud hosting, storage, telephony and other infrastructure environments that your business probably relies on. Regardless of what your own desktops, laptops, and servers are running, Linux is a part of your business.


It pays, therefore, to keep an eye on what’s going on in the Linux security space, and make sure that the services that your business may rely upon are as secure as they should be.


After ShellShock and Heartbleed, both Linux security issues that affect users and businesses regardless of their “home” operating system because of their impact on widely used cloud services, this month we witnessed the revelation that the “Turla” worm has been infecting Linux systems for years. Already known to exist on the Windows platform, Turla is an extremely advanced piece of malware that is believed to have been “state sponsored”. Last week however, Kaspersky Labs revealed that they had detected a version of Turla running on Linux systems. Circumventing Linux’s permissions model so that it could be run from a normal user’s account, and able to cloak itself from detection by Linux administration tools such as netstat, the Linux version of Turla is one of the most staggering threats to hit the Linux platform to date.


Whilst the average UK business isn’t the target of Turla, the fact that this trojan exists and is hoovering up network data on Linux systems means that there is a very good chance that some of your data could have been sucked up along with whatever it is that the mysterious makers of Turla (and their alleged state sponsors) are really looking for.


If your data lives in a cloud environment or if you use any kind of shared hosting, you should be talking to your provider now to ensure that they are up to date with the latest security patches and anti-virus, and that their Linux environments are Turla free.



The Linux Turla worm

Thursday, 4 December 2014

Cheap Android tablets increase BYOD risk

Cheap Android tablets increase BYOD risk


A bring your own device (BYOD) strategy can ease the burden on business IT departments by allowing demanding users to supply, and maintain, their own equipment. With increasingly tribal users strongly preferring Apple, Windows, or Android as their computing platform, bring your own device can end the need for the IT Manager to be one who makes the decision on who has what.


Any sensible BYOD strategy requires that users add anti-virus, of course, and some still restrict the use of some platforms to ensure compatibility between users’ chosen devices and core IT systems. But few BYOD strategies dictate the quality of devices that must be used. For every user who supplements their BYOD budget to make sure they have the latest and greatest gadgets, there will be a user who is looking to economise.


A cheap Android tablet is one area where a user can add an extra device to their portfolio without breaking the bank. Sadly, the openness of the Android operating system not only helps to bring down prices but can also increase the risk to users. What might look like a “stock” installation of Android can be anything but, as a recent study by BlueBox Labs revealed.


In the study, BlueBox Labs found a range of serious security problems were present on the devices that they tested “out of the box”. With no provision for upgrades or “over the air” updates on these budget tablets, these problems are never going to be fixed. Vulnerabilities such as Heartbleed, FakeID, Futux, and Masterkey were all detected.


Some of the tablets were also being shipped with the malicious software protection (the setting that prevents software from sources other than the Google Play store from being installed) switched off. Whilst this is a setting that some users might use to install in-house software, it isn’t something that should be left switched on or be there by default without the user’s knowledge.


The issues didn’t end there. Some budget tablets were found to be “rooted” out of the box, compromising Android’s security layer and making things easier for hackers. Custom versions of Android were also found, some with security features completely removed for no discernible reason.


The final blow against the budget tablets comes in BlueBox Lab’s claims to have found dubious software on some devices, including custom versions of “Angry Birds” that collected extra user data.


If you’re currently allowing Android tablets as part of your BYOD strategy, it may be time to make sure that your users are checking their devices are secure, or maybe to offer a list of recommended devices that are proven to be safe.



Cheap Android tablets increase BYOD risk