Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Email Security's Image Problem

Camera phones, JPEGs, and audio files pose a threat to email security

IT pros may be cranking up their email surveillance strategies, but a host of new threats could pose fresh worries. JPEGs, audio files, and camera phones remain Achilles heels for firms afraid of losing sensitive data. (See Email Gets More Outsourced Options, Here Comes the Judge, and Email Looms as IT Threat.)

Despite the plethora of products on the market for scanning text-based email content, images and audio files are tough to track, according to Vit Kantor, founder of security consultancy Spectrum Systems, which works with a number of banks and telecom firms.

"There is no effective way at the moment to analyze a picture or an audio file," Kantor tells Byte and Switch. "With JPEGs, people can run Optical Character Recognition (OCR) technology over the pictures and see what the information is, but it's expensive."

The image gap in email security is a major issue for firms in the manufacturing and design sectors, where drawings and photos are at the heart of their intellectual property. "There is a gap, just because there are no good [OCR] tools out there yet," says Jayson Hahn, CIO of West Caldwell, N.J.-based manufacturer Merrimac Industries, which makes radio frequency and microwave components. "It’s definitely a situation where it's difficult to say for sure that everything is fine."

Even if the appropriate technologies were readily available, though, Hahn says they may not be practical to use. Merrimac, he explains, would need a full-time member of staff to examine all the image-based attachments his firm sends out and check for false positives.

Email surveillance and archiving specialist Fortiva acknowledges that image-based email security is still a work in progress. "Aside from the overhead of trying to do that work, we haven't found tools and technologies that are that reliable," says Rick Dales, the vendor's vice president of product management.

These sentiments are echoed by email filtering vendor MessageGate, which urges users to look out for large attachments and unusual email patterns. "Do the guys in the mailroom really need to be sending around images?" asks Robert Pease, the MessageGate's VP of marketing.

MessageGate, according to Pease, can block outgoing emails at the gateway until the sender confirms that they comply with corporate privacy policies. This feature, called SenderConfirm, can specifically target emails with images attached, he adds.

For Merrimac, though, blocking image-based attachments would seriously impede the day-to-day running of the business. "If you set up rules by on a per-person and a per-group basis, that becomes another layer of management," says Hahn.

Instead, the exec has embarked on some detective work to make sure that users are complying with his firm's security policies. "You have to look for trends outside of email," he tells Byte and Switch. "Is the person staying longer than they have to? Has their [hard] drive suddenly filled up for the first time in ten years?"

Another technology posing a security hazard is the camera phone, which, as recent events in Baghdad show, can open up a Pandora's box of problems. "One of our biggest concerns is people using camera phones and emailing that information," admits Hahn. "That's a major issue for a manufacturing firm or anyone with government contracts."

The problem with camera phones is that the images can be emailed over the service provider's network, completely bypassing a firm's own email infrastructure. Such is the level of paranoia about this issue that Merrimac has banned camera phones within its facilities.

Camera phones are popping up on the radar of firms outside the manufacturing sector as well. "We wouldn't want people taking photos of customer account information and walking out with it, or emailing it," says John White, MIS officer at Brockton, Mass.-based Harbor One Credit Union.

A camera phone ban may be on the cards at Harbor One. "We have discussed it, but we haven't come up with any policies on that at this point," says White.

One thing, at least, is certain -- email surveillance is going to swallow up a sizeable chunk of IT time in 2007, even without checking images. A recent survey by Fortiva and law firm Pitney Hardin, for example, found that firms are spending an average of 12 hours per week for every 100 employees to review 10 percent of their emails. (See Email Review Can Reduce Risk and Jury's Out on Email Scrutiny.)

— James Rogers, Senior Editor, Byte and Switch

  • Fortiva Inc.
  • MessageGate Inc.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 9/17/2020
    Cybersecurity Bounces Back, but Talent Still Absent
    Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
    Meet the Computer Scientist Who Helped Push for Paper Ballots
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    How IT Security Organizations are Attacking the Cybersecurity Problem
    How IT Security Organizations are Attacking the Cybersecurity Problem
    The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-25789
    PUBLISHED: 2020-09-19
    An issue was discovered in Tiny Tiny RSS (aka tt-rss) before 2020-09-16. The cached_url feature mishandles JavaScript inside an SVG document.
    CVE-2020-25790
    PUBLISHED: 2020-09-19
    ** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our secu...
    CVE-2020-25791
    PUBLISHED: 2020-09-19
    An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with unit().
    CVE-2020-25792
    PUBLISHED: 2020-09-19
    An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair().
    CVE-2020-25793
    PUBLISHED: 2020-09-19
    An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From<InlineArray<A, T>>.