• About
  • Advertise
  • Contact
Monday, April 20, 2026
No Result
View All Result
NEWSLETTER
iotphoenix
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
No Result
View All Result
iotphoenix
No Result
View All Result
Home Security

Is your enterprise software committing security malpractice?

in Security
0 0
0
SHARES
12
VIEWS
Share on FacebookShare on Twitter

Back when this blog was dedicated to all things Microsoft I routinely railed against the spying aspects of Windows 10. Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing.

An analytics firm called ExtraHop examined the networks of its customers and found that their security and analytic software was quietly uploading information to servers outside of the customer’s network. The company issued a report and warninglast week.

ExtraHop deliberately chose not to name names in its four examples of enterprise security tools that were sending out data without warning the customer or user. A spokesperson for the company told me via email, “ExtraHop wants the focus of the report to be the trend, which we have observed on multiple occasions and find alarming. Focusing on a specific group would detract from the broader point that this important issue requires more attention from enterprises.”

Products committing security malpractice and secretly transmitting data offsite

ExtraHop’s report found a pretty broad range of products secretly phoning home, including endpoint security software, device management software for a hospital, surveillance cameras, and security analytics software used by a financial institution. It also noted the applications may run afoul of Europe’s General Data Privacy Regulation (GDPR).

In every case, ExtraHop provided evidence that the software was transmitting data offsite. In one case, a company noticed that approximately every 30 minutes, a network-connected device was sending UDP traffic out to a known bad IP address. The device in question was a Chinese-made security camera that was phoning home to a known ​malicious IP address​ with ties to China.

And the camera was likely set up independently by an employee at their office for personal security purposes, showing the downside to shadow IT.

In the cases of the hospital’s device management tool and the financial firm’s analytics tool, those were violations of data security laws and could expose the company to legal risks even though it was happening without their knowledge.

The hospital’s medical device management product was supposed to use the hospital’s Wi-Fi network to only ensure patient data privacy and HIPAA compliance. ExtraHop noticed traffic from the workstation that was managing initial device rollout was opening encrypted SSL:443 connections to vendor-owned cloud storage, a major HIPAA violation.

ExtraHop notes that while there may not be any malicious activity in these examples, it is still in violation of the law, and administrators need to keep an eye on their networks to monitor traffic for unusual activity.

“To be clear, we don’t know why these vendors are phoning home data. The companies are all respected security and IT vendors, and in all likelihood, their phoning home of data was either for a legitimate purpose given their architecture design or the result of a misconfiguration,” the report says.

How to mitigate phoning-home security risks

To address this security malpractice problem, ExtraHop suggests companies do these five things:

  • Monitor for vendor activity: Watch for unexpected vendor activity on your network, whether they are an active vendor, a former vendor or even a vendor post-evaluation.
  • Monitor egress traffic: Be aware of egress traffic, especially from sensitive assets such as domain controllers. When egress traffic is detected, always match it to approved applications and services.
  • Track deployment: While under evaluation, track deployments of software agents.
  • Understand regulatory considerations: Be informed about the regulatory and compliance considerations of data crossing political and geographic boundaries.
  • Understand contract agreements: Track whether data is used in compliance with vendor contract agreements.
Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download Nulled WordPress Themes
Download WordPress Themes Free
Download Nulled WordPress Themes
Premium WordPress Themes Download
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
download micromax firmware
Download Premium WordPress Themes Free
udemy course download free
Tags: Is your enterprise software committing security malpractice?
Next Post

Self-organizing micro robots may soon swarm the industrial IoT

Recommended

Slideshow: Beyond passwords

New Microsoft BizTalk Server coming in Sept.

RFID boosts supply chain performance

Loading

Category

  • Analysis
  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Guest Opinions
  • Hardware
  • Infrastructure
  • Insider Insights
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • New Connections
  • News
  • Open Source
  • Opinion
  • Research
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Videos
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2024 iotphoenix.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Technology Industry

© 2024 iotphoenix.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In