- Use Cases
- About Us
A staggering 822 million records were exposed by data breaches in 2013, according to research firm Risk Based Security. Data breaches compel organizations to look at their network infrastructure and security processes, and shore up areas where inadvertent data leaks are taking place.
The use of free online file sharing and syncing solutions is an overlooked area that leaves organizations vulnerable to unintentional data leaks. While most employees would not consider using a non-corporate sponsored email system, those same employees often readily collaborate through a free file-sharing service, because it is often easier to use than what is available from their employer.
Unfortunately, IT departments are often unaware or turn a blind eye to ad-hoc unmanaged and controlled file sharing activity Compounding the problem, many of these ad-hoc file sharing solutions offer little user authentication, encryption, tracking or audit controls. As a result sensitive data can be shared with unauthorized users without being screened by data leak prevention (DLP) or other security solutions often deployed for corporate tools such email.
Instead of ignoring the issue at hand, IT departments and senior managers should accept that employees need an easy way to collaborate without putting the company at risk. Ask these key questions to determine which solution ensures your organization's data security:
The days of turning a blind eye and ignoring ad hoc, BYOD solutions are over. You should answer these four questions to set your company practices around sharing information to avoid the worst-case scenario of sensitive data leaking outside the company.