iTnews

How do I: Protect my data when I'm in China

By David Glance on Apr 22, 2013 7:00AM
How do I: Protect my data when I'm in China

Build your own great firewall.

For travellers doing business in China, the risk of mobile devices and computers being targeted for corporate and military espionage has become a very real threat.

Travellers have identified machines left in hotel rooms having been accessed and key-loggers sometimes installed. Mobile phones have been accessed and tampered with in the same way.

Incidents like these have become part of a general escalation in cyber-attacks by the Chinese on a range of targets but spurred on by China’s insatiable desire to accelerate the growth of its industrial, scientific and military capabilities.

The risk has been acknowledged across the board with head of MI5, Sir Jonathon Evans, recently warning universities in the UK that they were high-risk targets of Chinese cyber-attackers seeking research secrets. Companies with employees travelling to China have already started taking a variety of precautions. 

As with all matters relating to security, the challenge is to be restrictive enough to keep corporate assets and secrets safe, but not so restrictive as to prevent the employee from doing any useful work.

The principal threats that have been identified start with laptops and mobile devices left in hotel rooms. Through a variety of means, they can be infected with key-loggers and spyware. Of course, it is not just the information on the devices themselves that is at risk. Once the attackers have usernames and passwords then the employee’s corporate networks are also potentially at risk.

Even without physical access to the machines, connecting to any network, whether it is the phone network or the hotel’s wireless network, poses multiple risks. Surveillance again may yield usernames and passwords but also more importantly from a Chinese security aspect, information about what their own citizens may be doing.

There are a variety of strategies to mitigate, but not entirely obviate, the risks. Leaving aside the option of not taking any device to China and avoiding all electronic communication, there are some basic strategies that can be employed:

1. Start with a clean slate

Phones and laptops can be imaged specifically for the trip with no corporate data and then re-imaged after their use.

2. Use secure mail services

Access to email should always be via SSL or via a VPN. There are a number of VPN services that can be used, although there is no guarantee that these services have not been compromised in some way. Use of corporate VPNs should be avoided unless it has been established with limited access to the full corporate network. VPN access may be blocked on hotel networks or through China’s “firewall” and so it may not be possible to always rely on this as the sole means of communication.

3. Stay near to your gear

If possible, devices should be kept with the traveller at all times, although unless the device is a tablet, carrying a laptop around would not necessarily be convenient. An alternative approach is to use a device, laptop or Chromebook, that can run a distribution of the Linux operating system (such as Ubuntu) from an SD card or a USB memory stick. This enables the owner to remove the card and carry that with them. A remote desktop could be accessed if it was necessary for the user to use Windows for example.

4. Use encryption wisely

Encrypting sensitive data or using the operating system's built-in disk encryption is a possibility but suffers from the drawback that if key-loggers are installed, attackers may obtain access to passwords for the encrypted files.

5. Disable Java, Bluetooth and keep security software up-to-date.

Ultimately, it is always safer to assume that someone may have accessed information on, or transmitted from, a computer or mobile phone whilst in China and so if there is anything sensitive to communicate, doing it digitally should be avoided.

On a final point, whilst, China is not the only country where these measures might apply, it is the main country that has the means and motive to carry out surveillance at this scale.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
chinadatafirewallsecuritytraining & development

Partner Content

Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
Don't miss Australia’s premiere IoT Conference on 9th June
Promoted Content Don't miss Australia’s premiere IoT Conference on 9th June
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Operationalising net zero to be centre stage at IoT Impact conference
Partner Content Operationalising net zero to be centre stage at IoT Impact conference

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • IoT Impact Conference
  • Cyber Security for Government Summit
By David Glance
Apr 22 2013
7:00AM
0 Comments

Related Articles

  • China ministry orders 38 apps to rectify excessive collection of personal data
  • China drafts new data measures, defines "core data"
  • China orders Didi app downloads suspended over data violation
  • AGL finds new CISO at NBN Co
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

What to expect from the incoming Labor government

What to expect from the incoming Labor government

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.