Feeds

EDS bans IM

Big hammer, small nut

  • alert
  • submit to reddit

EDS, the computer arm of the British government, has banned its staff from using Instant Messenger products in the workplace. It cites security concerns, especially over virus transmissions.

A memo to staff from EDS' security compliance unit leaked to The Register describes "use of Instant Messenger (IM) products through the Internet" as a "risk to Client EDS' infrastructure and network".

The company will block access to public Internet instant message sites at its firewalls from tomorrow (May 8).

Security staff can make exceptions to the rule but the policy means that from tomorrow EDS staff will be unable to use popular IM products such as AOL, ICQ and Yahoo!

Gateway AV tools or managed services providers can be used to block infectious emails before they reach end users, but instant messages go directly to workstations - so skipping a layer of defence.

IM is convenient but it can create holes into an organisation. Instant messaging attacks have become a common method of propagation in recent viral outbreaks, and (as CERT warned back in March) a tool for social engineering, including tricking users into running malicious software (potentially DDoS attack tools) on their machines.

Neil Barrett, technical director of security consultancy firm IRM, said IM products are "implicitly clandestine" and make the exchange of files easier - something likely to be frowned on by security-conscious organisations.

EDS is not noted for its lightness of touch with staff - and it hasn't always been so cosy with the UK government. In 1986, the company was found out ordering staff, American nationals, to lie to British immigration officials. The staff were told to say they were coming to the UK on holiday, when in reality, their real purpose was to work. That cost EDS one measly UK government contract - or, to be precise, the chance to bid for one contract. ®

Related stories

Instant message, cracker tricks
Klez worm infects and infuriates
ICQ hack theories flood into Vulture Central

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.