Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    Understanding Data Security Risks of P2P

    Written by

    Brian Prince
    Published April 25, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Peer-to-peer file transfers are increasingly a source of data leaks, and IT organizations may not be appreciating the risk.

      According to a survey by the Ponemon Institute of 750 IT professionals released the week of April 21, although 63 percent of respondents said their organizations forbid the use of P2P applications, only 5 percent said their organizations monitor P2P networks for data leaks. Twenty-six percent admitted they were unaware of any policies regarding P2P applications.

      The problem was underscored in 2007 when a former employee of Citigroup’s ABN AMRO mortgage group leaked the personal information of 5,000 people via a P2P messaging network. Pharmaceutical giant Pfizer also experienced a breach courtesy of a P2P application that exposed the personal data of 17,000 people.

      Cyber-criminals use P2P tools for identity theft, a security analyst warns. Click here to read more.

      Tiversa, which sponsored the study and monitors P2P networks, reported that the previous week it had uncovered W2 forms for 2,498 employees of a company coming from that company’s own network. The user in that case was on the Gnutella network using LimeWire, and while the organization had a policy against P2P usage, the employee disregarded it, said Robert Boback, CEO of Tiversa. Adding to the issue is that peer-to-peer networks are typically designed to circumvent firewalls and go over Port 80 instead of other monitored ports, he said.

      “Our research shows that the highest time of use is during the U.S. work day-these aren’t kids downloading files at night; P2P users are often individuals at work taking advantage of their high bandwidth,” Boback said. “For many companies that have put security measures in place, we still find files disclosed from their internal corporate IP range because P2P is very good at getting around IT measures.”

      In addition, files coming across P2P can be disguised to look like legitimate MP3s but instead be Trojans. Paula Skokowski, vice president of marketing at secure file transfer vendor Accellion, said spyware and viruses transmitted via P2P file sharing can spread very rapidly and widely among users.

      Blocking Is a Simple Answer, but Difficult Solution

      There is of course a simple answer to the problem-block P2P applications. However, Gartner analyst Peter Firstbrook noted that it is not easy to block all of them, and users actively look for ways to avoid the blocks, such as using laptops when they are out of the network. In addition, data loss prevention tools are not widely deployed, he said.

      “[DLP tools] are mostly just monitoring versus blocking to avoid blocking legit business, so it is a bit like [closing] the proverbial barn door after the horse,” Firstbrook said. “A well-configured DLP solution should catch P2P leaks, but that is not deployed in most organizations.”

      For companies, anywhere from 40 to 60 percent of the confidential files disclosed on P2P file-sharing networks originate from sources outside the corporate perimeter, such as suppliers, contractors, attorneys, partners, and employees working from home or on the road, Boback said.

      “These endpoints are almost impossible for a company to control,” he said, referring to those third-party sources as the extended enterprise. “An organization must take an extended enterprise view because very often the information custody chain extends outside their four-walled perimeter security approaches.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×