Corporate data slips out via Google Calendar
Some users appear to be sharing calendar information without realizing it
IDG News Service - It's not clear what gets discussed during McKinsey & Co.'s weekly internal communication meeting, but the dial-in number and passcode for the event can be easily found by searching with Google.
The data is out there thanks to Google Calendar, a feature added to Google's Web-based calendar service last November. Google bills it as a cool way to discover interesting events, but a few quick searches show that it can also be used to turn up sensitive corporate information that was inadvertently made public using Google Calendar.
Launched last year as part of Google's effort to develop a series of Web-based productivity applications, Google Calendar gives users the choice of keeping calendar entries private or publishing them for the world to see, but some Google Calendar users appear to be sharing their calendar information without realizing it.
The McKinsey dial-in information, for example, was posted by a person who had shared a number of calendar events including project status meetings and call-in numbers for the company's "McKwiki Weekly" project.
McKinsey spokesman Mitch Kent confirmed that the name on the Google Calendar matched that of a McKinsey employee in the company's IT department. McKinsey employees do not "use Google Calendar on a regular basis," he added.
Further searching revealed that quite a few corporate calendars can be found on Google Calendar, yielding such tidbits as the date and time of vendor meetings and names of projects in the works. Dial information could also be seen Tuesday on other calendars for calls on topics such as "Deloitte's V2 Status Meeting - Updated" and "Compliance Overview."
Details for several JPMorgan Chase & Co. conference calls relating to the company's storage systems, including a dial-in number and passcode for a May 3 call to discuss a "SAN Security Remediation Project," also could be seen publicly. The Google Calendar user who posted the JPMorgan information could not be reached for comment.
"This is pretty much exactly the kind of recon necessary to start doing industrial espionage," wrote Robert Hansen, the CEO of Sectheory.com, when he first blogged about this issue today. "Weekly meetings that discuss key internal information? Not looking good. Sometimes you see major leaks in the least likely places."
This kind of data leakage is a growing problem for corporations whose employees are adopting a new generation of Web-based productivity tools without necessarily understanding the security implications, said Marv Goldschmitt, vice president of business development with data auditing appliance vendor Tizor Systems Inc. "People may not understand what it means to put their information on a public service."
Google Calendar gives users three ways of publishing calendar entries: "default," "private" and "public." But the company needs to make it clear to users when they are posting information to the public, or face the risk of being blamed for its users' mistakes.
This could happen if news of a corporate acquisition were leaked via Google Calendar, he said. "That would have been a case of misuse by the user, but is the public going to read it as that, or are they going to read it as now they don't trust Google?"
Google representatives did not immediately respond to requests for comment.
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Web Apps White Papers | Webcasts