Remote Work: Responsible Sharing of Personal Hardware


1 in 3 CyberSecurity breaches in 2024 involved Shadow Data

-- IBM Cost of a Data Breach 2024

Shadow Data breaches were 16% more expensive, and took 20.2% longer to locate with average cost of US$5.27 million

-- IBM Cost of a Data Breach 2024

Shadow IT, Shadow Data

Data breaches and intellectual property theft: By letting employees access sensitive information from home WiFi, personal laptops, and unauthorized cloud storage, organizations expose passwords, financial models, healthcare records, product designs, or other regulated data to potential theft.

Malware infections and network infiltration: Without IT approval or security vetting, shadow IT apps often contain vulnerabilities like malicious scripts, viruses, spyware, or ransomware. By infecting a personal device, cybercriminals can penetrate previously secure networks when that device reconnects on corporate premises. From here, threats quickly move laterally to compromise other on-site systems or launch attacks exploiting Active Directory and cloud credentials

-- IBM Remote, Rogue, and Risky: The Shadow IT Epidemic

2 in 3 Remote Workers use Shadow IT. Despite knowing the business monitors their IT activity

-- Zluri: Shadow Statistics

Remote Work & Shadow IT are on the rise globally

40% of employees in Tokyo, Japan work remotely.

Securities and Exchange Commission fined US$125 million to 16 firms for using Shadow IT messaging applications on their personal devices

-- Cyber Defense Magazine

CyviCo is the only solution available for remote working that protects a Companies Intellectual Property and satisfy CyberSecurity control, compliance and reporting requirements

-- Keidrych: Distributed Computing Specialist

CyviCo Protection: Shadow for Light

Hard Profile Isolation

CyviCo is an augmentation of CyviZen: Responsibility is Power for commercial requirements, as such automatically inherits:

  • Data Ownership,
  • CYN: Your Digital Self,
  • Hardware Fingerprinting

Additionally, CyviCo provides Profiles guaranteeing Hard Isolation between personal and work data even on personal non-work provided machines. CyviZen & CyviCo Profile Isolation is total, and requires a physical reboot of the machine to switch profiles.

The only way unprotected data can be copied off a CyviZen when using a CyviCo profile without approval is via external visual recording device

This means that CyviCo knows and manages, who you are, on which authorised company profile is in use, and what data permissions are granted at all times.


Declarative Idempotent Builds

CyviCo has three distinct package stores available, see image to left.

CyviCo packages via ZenPkgs and CoPkgs are attested via Trustix ensuring

  • Binary Planting Protection
  • Tamper-Evident History
  • Agree on Inputs, Agree on Outputs

CoPkgs is exclusive to your use and only available within your organisation.

CyviCo can ensure that packages are distributed encrypted and only those people or machines authorised to use are able to. If you use trade secrets and have skilled engineers that can reverse compiled code this option is a must.


Anonymous Vaulted Storage

CyviCo ensures your data is protected by using BCacheFS to prevent filesystem replay attacks such that skilled remote developers or engineers are unable to rewind data in time on their system.

Additionally, per image. CyviCloud, an add-on to CyviZen offers Quantum Resilliant Storage via gocryptfs or cryfs depending on your specific needs. Every single folder, including nested folders within other folders can be stored to different physical locations per the Data Sovereignty Legislation that applies to your situation. Alternatively, P2P storage is also available. (CyviCloud does require an OnlyKey for use)


Total Control

Operating System

CyviCo and CyviZen for the most part provide sensible defaults, NixOS style Modules are used for App Configuration and you are free to override, disable, add or change any settings. CyviZen only prevents overriding settings that affect data ownership or system stability

This includes access to Linux Kernel modules and permissions. If your IT Policy disables USB, SD Readers, Cameras, Microphones it is all possible.


NOTE

CyviCo does not affect or influence the DeniZen profile in any way; they are totally isolated from eachother.

This includes hardware & Linux Kernel settings, what is overriden in Co is only done so in Co.

Additionally, as CyviCo augments CyviZen all updates are controlled by the DeniZen profile. For remote workers such as freelancers with many clients this ensures multiple Co profiles (up to 9) are available on the same machine.

Co profile can verify its version against the latest released by the Company and take appropriate action should an update be required. i.e. Deny Access to Data, Reboot into DeniZen profile


Unified Firewall & Transparent Split Proxy

  • OpenSnitch via extended Berkley Packet Filter (eBPF) for Application & System Filewall control.
  • Dae as a Transparent Split Proxy via eBPF

eBPF and its power (only available in Linux Kernels) is an entire topic on its own see ebpf.io


CYN: Your Digital Self

An authoritative non-fudgible identity created for and by you. It sits above all other digital identities assigned to you by other governing bodies, affording you unprecedented protection and security in the digital world