Gone in 6.0 Seconds
Find out what you can do to protect your data.
September 30, 2002
The fundamentals of secure remote computing include making sure your users aren't being attacked or spreading viruses and that they have secure connections to the corporate LAN. First, all your laptop users need personal firewalls, which will repel some common attacks. Personal firewalls also can "hide" a PC by not letting it respond to connections or pings, by blocking ports and protocols, by performing host-based intrusion detection, and by designating which applications may access the Internet. Keep in mind that you want a centrally managed firewall; end users should not make any decisions on security--you dictate the policy, they follow it (for more on personal firewalls, see our Buyer's Guide).
We have found that firewalls with application control are better at blocking Trojans than are firewalls that block only ports. That's because Trojans can operate by making outbound connections on common ports. Firewalls alone, however, won't protect against viruses. For this, you need antivirus software, preferably a package that checks often for new signature definitions.
The next step in securing software is to verify that the laptop user is legit. There are a few options here. One is to force the user to enter a login password upon start-up or after an idle period, in either the OS log-in screen or on BIOS boot. If passwords don't give you a secure feeling, biometric authentication, such as retinal scans, fingerprint or voice analysis, is a possibility. Keep in mind, however, that many biometric devices plug into serial or USB ports and are one more thing for a laptop user to lug around, lose or break. Acer, MicronPC and other vendors offer laptops with fingerprint scanners built in (see InformationWeek's "Fingerprints and Notebooks: Hand in Hand").
Voice analysis seems like a nice option, as many laptops have a microphone port, but can be problematic. In noisy environments, for example, the computer might not pick up the sound, and laryngitis or a bad cold might lead to a frantic helpdesk call.
As for connecting to the corporate network, two words: Use encryption. First, determine what needs to be encrypted. If all your users will do is access Web-based programs, you can get away with HTTPS. You can also encrypt e-mail by using SSL over IMAP or POP3, which makes sending and receiving e-mail over the Internet more secure by encrypting the entire session, from host to e-mail server (for a secure appliance e-mail solution see "In the M2000, Mirapoint Makes a Mighty Message Server"). There are two major forms of e-mail encryption, S/MIME and IMAP/POP3 over SSL, and they serve two different needs. S/MIME encrypts or signs the message, but not the session. IMAP/POP3 over SSL secures the login and session, but on the next hop the data can be transmitted in plain text. IMAP over SSL is very simple and requires no user intervention, but not all client software supports it. If you want all your traffic to be encrypted, or if some of your programs do not support encryption, a VPN is the way to go. Virtual private networks let remote users access internal resources without making these resources publicly accessible. (For more on VPNs, see "Add Some FiberLink to Your VPN Diet.")
The Plot Thickens |
In addition, disable split tunneling so that, while the VPN is active, all network traffic flows through the VPN, not just traffic destined for the corporate network. Some VPN clients come bundled or integrated with a personal firewall, which can simplify deployment and management. Most VPN clients support integration with smartcards, USB tokens and biometric devices for certificate handling and authentication.
All these firewall, antivirus, authentication and VPN systems will mean an increased demand on your helpdesk and more software to keep up to date, and each may require separate administration servers and management interfaces. Factor these issues into your cost analysis (for more on securing remote users, see "Telecommuting: Keeping Data Safe and Secure").
Theft has been a reality of life since the first caveman lifted a dino drumstick from his neighbor's fire. Laptops are equally tasty and easy targets. It takes only a second for someone to grab a laptop bag in a crowded terminal, and it's also easy to forget a bag in the overhead luggage bin. Hey, even an agency as anal as the IRS has mislaid 2,332 laptops in the past three years, and it can't rule out private taxpayer information being lost as well .
Clearly, losing a laptop can cost more than just the price of the hardware. How valuable is the data on the computer? If it wasn't backed up, many hours of work could be lost. Some laptops also contain private information or sensitive trade secrets worth millions if they fall into the wrong hands.
Protective products from cable locks to motion alarms are available. But no lockdown product will ensure 100 percent theft avoidance; it's merely a deterrent. Most laptops are made out of relatively weak plastic with only small slots for locking devices. We found that a screwdriver can sometimes pry open a case enough to remove the lock. A palm sized butane/propane torch can melt the plastic to weaken it. A laptop with a gaping hole in the side will fetch less than an undamaged one, but the parts can be sold individually, and a thief who's interested only in the data won't care about physical damage. We recommend choosing a laptop that offers a hardened plastic case, like Hewlett-Packard Co.'s OmniBook 6000, which has a magnesium-reinforced body, or one that has a reinforced security slot.
Buh-ByeOnce a laptop is stolen, there's little you can do to recover it. National registries for stolen laptops aren't universally checked, especially by people buying from online auction sites or at flea markets. The exception to this is if you install theft-recovery software, such as those we evaluate in this article. However, there are limits to how effective these programs are.
And though your hardware might be history, your data could be safe--if it had been encrypted. You can encrypt individual files and folders or you can encrypt the entire disk. Microsoft Windows 2000 and XP users who want to encrypt individual files can use the built-in EFS (Encrypted File System) utility. Simply right-click a file in Windows Explorer and select encrypt. Of course, just because a file is encrypted does not mean it doesn't reside elsewhere on the disk. EFS works on individual files and directories only, not on the entire disk. It does not encrypt temp files and printer spools, nor the swap file. One Microsoft recommendation is to encrypt the temp directory also, but you still can't encrypt the swap file. Guidance Software makes a product called EnCase that is targeted to law enforcement for hard-drive forensic study. Using EnCase, we found in the Windows swap file pieces of a large text file we had encrypted using EFS.
Furthermore, deleting a file does not actually erase it; it just removes the markers defining where the file is stored. Only by overwriting a file is it really deleted. You could overwrite many previously deleted files by defragging your hard disk, and there are programs, like WipeInfo in Norton Utilities or Jetico's BCWipe, that will delete a file and then immediately overwrite every sector it occupied.
The downside of using a file- or folder-based encryption program is that it puts the decision to encrypt in the hands of users, who may forget to encrypt a document after working on it or even leave temp files all over the place. The only way to truly protect data is to use a full-disk-encryption program. The other advantage of full disk encryption is that even deleted files are encrypted, so you don't need to worry about overwriting. Not many of these systems are available, but we examined a few.
You can encrypt files individually, either file by file or whole folders, or encrypt an entire drive. Each method had advantages: When you encrypt individual files with third-party software, you can send them across a network knowing that the files won't be accessible to anyone who does not have the password and the encryption software loaded. Whole-drive encryption, on the other hand, prevents data theft if a computer is stolen. We looked at a trio of disk-encryption offerings: PC Guardian's Encryption Plus Hard Disk, Pointsec Mobile Technologies' Pointsec PC 4.0 and WinMagic's SecureDoc 3.1.
File-level encryption is a well-understood process. Commonly used encryption schemes include AES (Advanced Encryption Standard), Blowfish and 3DES with keys varying from 56 to 256 bits in length, and all sorts of single-file and folder-encryption products are available, including some shareware and freeware. Some encryption products require you to decrypt the data with the same computer (or key) with which it was encrypted. Other products let you encrypt/decrypt with a password. The user's needs should determine which method you use.
A huge number of file- and folder-encryption programs are on the market, with little differentiation, so we decided to take a look at two: Microsoft EFS because it's built into Windows 2000 and up, and PC Guardian's Encryption Plus File. You'll find our evaluation of these products here.
To protect temporary files, swap files and printer spools, you need to encrypt the entire drive. Because the entire file system is encrypted, including the OS, drive-encryption software must load before the OS. Normally, after you power on a computer and it goes through its memory test, the boot loader will load the OS. When you install drive encryption software, it modifies the boot loader to run instead of Windows on boot. The encryption software then authenticates the user, and, on success, loads Windows. This is a much more complicated procedure than simple file or folder encryption--the point of these products is to protect the data from a thief who gets his or her hands on the hard drive, not to secure the data when copied or transmitted.
The three drive-encryption products we evaluated load on bootup, request a user name/password login or token, and then perform on-the-fly decryption and load the OS. Because the OS is encrypted, users must enter the decryption key (password or token) to boot the system. If they forget the password, an administrator can override the user's password.
Files remain encrypted on the drive. However, they are in the clear when sent over the network or copied to a removable disk or unencrypted partition/drive. When we analyzed the disk after encryption, the entire drive was encrypted except for some bootstrap code. Some features to look for are multiuser support, recovery keys, administrator overrides, centralized management and integration with PKI (public key infrastructure) and tokens, in addition to user name/password authentication.
Also, there is a difference between full-drive encryption and virtual-drive encryption. Software that performs virtual-drive encryption creates a single large encrypted file on a disk, and is presented to Microsoft Windows as a logical mountable drive. It acts like a container.Emulation software (such as VirtualPC on the Apple Macintosh) and disk-image files have been doing this sort of thing for years. However, these virtual drives offer the same level of protection as folder-level encryption--in other words, the swap file and temporary files are unencrypted. Be careful: Sometimes the product marketing won't make this distinction clear.
Winmagic secureDoc 3.1
SecureDoc encrypts drives with DES, 3DES and AES. It also lets you encrypt individual floppy disks with the same encryption key or a key shared among a few people. We were able to encrypt two floppy disks with two different keys. The advantage here is you can protect and hide data from multiple departments within your organization. This is a unique feature--none of the other vendors supports removable drive encryption--and is enough to make SecureDoc our Editor's Choice.
Disks can be encrypted and shared among a group, which is a common activity, or reserved for the lone user. In addition, you can store the encryption key on the floppy disk instead of the hard drive, thus requiring the floppy in addition to user name/password and acting as a token. Another feature supported is locking down the removable drives. We were able to prevent the user from accessing the floppy drive, though the efficacy of this feature comes into question when you consider that the files can be uploaded easily off the computer via HTTP or FTP.
SecureDoc 3.1 Disk Encryption Software, $159 (individual license). WinMagic, (905) 502-7000, (888) 879-5879. http://www.winmagic.com
Pointsec Mobile Technologies Pointsec PC 4.0
Pointsec has fewer features than SecureDoc, but still offers a lot of options. Encryption is done via Blowfish or CAST, and the product lets you create multiple users and groups, and offers smartcard integration. Like all the products we evaluated, there is support for the administrator to generate a one-time login password in case the user forgets his or her password and needs to change it.
Users can be granted or denied access to individual partitions. And Pointsec PC can't encrypt removable media. The initial encryption process (after installing the product) runs in the background while Windows is loaded. This means users can continue to work as a drive is being converted to an encrypted format. SecureDoc offers this capability; PC Guardian's product does not. Seeing as it took us several hours to encrypt a 9-GB drive, this is a useful capability.
Pointsec PC 4.0, $42,580. Pointsec Mobile Technologies, (925) 256-2500, (800) 579-3363. http://www.pointsec.com
PC Guardian Encryption Plus Hard Disk
This product was the simplest to use and administer, but it is less feature-rich than its competitors. The program is limited to one user login/password per machine. There is no support for tokens or PKI integration, and the product will encrypt only the primary hard drive. It does, however, offer master password capabilities, custom installer-package creation and one-time password overrides. This product seems best suited for individuals and smaller departments, especially those that want an easy-to-configure package. For large installations that require good key management, multiple users and PKI, the other products would be a better choice.
Encryption Plus Hard Disk, $99.95 per seat (50 seat minimum). PC Guardian, (415) 459-0190, (800) 288-8126. http://www.pcguardian.com
R E V I E W
Disk Encryption Software
Products Reviewed: PC Guardian Notebook Guardian | Kensington Technology Group Sonic Lock Motion-Detecting Alarm | Kensington Technology Group Notebook ComboSaver | Targus Defcon 1 Ultra
Lockdown devices are designed to deter, not prevent, theft. These products fall into two main categories: traditional steel-cable kits and motion-activated siren alarms. We tested both types. PC Guardian's Notebook Guardian (both the standard and ultra models) and Kensington Technology Group's ComboSaver are steel-cable kits. Targus' Defcon 1 Ultra and Kensington's Sonic Lock are alarms. Most notebooks have a security slot on its side, known as the Kensington lock after the company that patented it, and all the products we tested lock to the laptop via this slot.
The cables are made out of multiple strands of thin, hardened steel, bundled and twisted together, and encased in a plastic coating. Even the heaviest kit weighs barely one pound, but remember, the more steel in the cable, the harder to cut through. There are several options for the locking mechanism, including combination, keyed lock and keyed lock with a master key. The locks come with two keys, and there are no override capabilities for a combination lock.
The motion-alarm devices are easier and quicker to disable, but they require more preparation work for the thief. Also, if the thief fails to act quickly enough, the alarm will attract more attention than a cut cable--these products emit a 100-dB siren when jostled. Of course, there is a strong possibility of false alarms, and we all know how people ignore car alarms. And the thief could place a hand over the speaker, greatly diminishing the volume. There is a 4- to 8-second delay between the time the device detects movement and the time it goes off, giving a legitimate user time to enter the combination. You need to replace the batteries every few months.
We pitted these devices against one another to determine which one we could discreetly disable more quickly. We considered 30 seconds with little noise enough time to steal a laptop without being noticed. This was, of course, assuming the device was secured to a desk in an office--it takes only a second or two to grab a laptop bag in public. Following this logic we awarded our Editor's Choice for lockdown devices to PC Guardian's Notebook Guardian Ultra because it was so difficult to cut through.
PC Guardian Notebook Guardian
PC Guardian sent us two versions of its Notebook Guardian product, standard and ultra.
Both devices are simple steel cable kits, but the ultra model is twice as thick as the standard. Strangely, both models list for $59.95. It took us about 27 seconds to break the standard version, but more than 15 minutes to cut through the ultra model.
Notebook Guardian Ultra and Standard, $59.95. PC Guardian, (800) 288-8126, (415) 459-0190. http://www.pcguardian.com
Kensington Technology Group Sonic Lock Motion-Detecting Alarm
Kensington's Sonic Lock is meant to be attached to a laptop bag, but it has an adapter so it can be connected to a laptop as well. The device has a three-digit combination for the lock and a separate combo for the alarm. This lock failed the dunk test: We were able to silence the alarm by submerging it into a cup of water. Also, oddly, the battery cover isn't protected. Using an electric screwdriver, we were able to remove the batteries before the alarm went off, in just under 4 seconds.
Sonic Lock Motion-Detecting Alarm, $39.99. Kensington Technology Group, (888) 750-2343, (650) 572-2700. http://www.kensington.com
Kensington Technology Group Notebook ComboSaver
Kensington's product uses a three-digit combination (from 0 to 999) instead of a key. The advantage here is you don't have to worry about managing keys. The disadvantage is there's no way to override the lock if you forget the combination. It took us about 25 seconds to cut through the steel cable using a small cable cutter.
Notebook Combo Saver Security Cable, $39.99. Kensington Technology Group, (888) 750-2343, (650) 572-2700. http://www.kensington.com
Targus Defcon 1 Ultra
The Defcon 1 Ultra sports a four-digit combination lock, and its batteries are protected--you need to unlock the device to access the battery compartment. However, the Defcon 1 failed the dunk test. The cable is also very thin--one quick snip was all that was required to cut it. It took us about 3 seconds to disable this device, and a total of 20 seconds to break and remove the lock and walk away with the laptop.
Defcon 1 Ultra, $49.99. Targus, (714) 765-5555, (877) 482-7487. http://www.targus.com