E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING
|
|
|
- Aleesha Hubbard
- 10 years ago
- Views:
Transcription
1 E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING
2 E mployees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media tools in record numbers. This high level of unchecked file transfer methods poses a major risk for companies and their security measures. IT managers today face diverse challenges with this. In this E-Guide, learn what IT managers, as well as best practices. PAGE 2 OF 10
3 WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING There is a danger in employees being tech-savvy they can use devices and means to transport and exchange files that are beyond the control of IT management. Employees may simply see webmail, file-sharing services, cloud storage, USB sticks and smart devices as easier to use than traditional corporate tools to transfer files. For IT managers, however, users with unchecked file transfer methods represent unacceptable security risks with regulatory implications. The internet is an empowering thing, but the proliferation of uncontrolled user tools is high and you cannot put that genie back in the bottle. IT managers must accept a degree of cultural change, then provide attractive alternatives that allow them to monitor, quantify and model file transfers. A responsible reaction to this unconstrained business risk is driving businesses around the world to look for a simple, user-friendly route to protecting their most valuable data assets. IT managers today face diverse challenges and have to balance many PAGE 3 OF 10
4 simultaneous projects. They must always be open to new ways to become more efficient and security conscious, such as increasing the security and management of business file transfer. INSECURE METHODS ARE STILL BEING USED TO SEND CONFIDENTIAL FILES Employees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media tools in record numbers. This has resulted in a lack of visibility and control for IT departments, exposing organisations to security and compliance risks. Both the means by which users can share information, and the sheer volume of data changing hands between individuals and between businesses, has skyrocketed. MANY EMPLOYEES CHOOSE TO ATTACH PRIVATE COMPANY DOCUMENTS AND DATA TO PERSONAL Recent surveys have shown that a vast majority (84%) of business users send classified or confidential information via corporate attachments. Of those, 72% do so weekly and 52% daily. IT managers have limited control because users are sending a clear message PAGE 4 OF 10
5 with their file-sharing habits. They cannot afford delays or slowdowns associated with jumping through perceived hoops to send out information and files that keep business humming. And if IT managers do not provide the tools they need to send large and confidential attachments or if the processes are too difficult to use then users will take matters into their own hands. EMPLOYEES NEED ALTERNATIVES TO CONSUMER-GRADE FILE TRANSFER SER- VICES FOR BUSINESS USE If corporate systems limit the size of file attachments, or if IT vetoes service requests, then resourceful employees do not just throw up their hands in resignation, they look for workarounds. The growing popularity of file transfer sites and cloud services aimed at consumers is making it easier for business users to sidestep IT. Moreover, it is not just individual employees who are going rogue entire departments discretely bypass sanctions. This behaviour makes it harder for IT managers to stay in control of sensitive files and data leaving the corporate walls. Basic file transfer protocol (FTP) tools, for example, have been around for a long time, and are frequently used to send sensitive information containing PAGE 5 OF 10
6 usernames and passwords. Often these tools increased in popularity without developing more sophisticated security precautions. IT managers must demand greater security controls, such as 256-bit data encryption, validated cryptography, OpenPGP file encryption, file integrity checking and file verification. RISK OF DATA LOSS AND THEFT REMAINS HIGH WITHOUT GREATER CONTROL AND MANAGEMENT When business users are not turning to personal accounts or free filesharing services, they are often sticking files on USB thumb drives, smartphones or other external devices. Unfortunately, recent surveys show that almost one-third have lost a USB device, smartphone or other external device containing business or personal information in the past a tremendous risk for any organisation. This can result in unhappy customers, brand harm and reputation loss. High leakage levels make it a pretty tough world for an IT manager. The sheer number of devices and removable media tools people are carrying in their pockets mean it is no longer about controlling desktops. Users have smartphones and tablets and want to use them at home and in the office. PAGE 6 OF 10
7 LOW VISIBILITY INTO DATA MANAGEMENT ONLY RAISES RISK AND HINDERS COMPLIANCE Most companies create and maintain policies that mandate the use of approved tools for moving and sharing information. However, research suggests that fewer than 32% strictly enforce the policies, making these mandates largely meaningless. One reason these policies may not be strictly and consistently enforced is that IT managers cannot track the files entering and leaving the company. No visibility means no compliance with internal policies or, potentially, with external regulations and laws. IT MANAGERS MUST TAKE STOCK, REGAIN CONTROL AND WORK TO TRUST USERS AGAIN The file-sharing habits of today s employees may be risky, but ultimately are driven by a desire to get work done efficiently. This need must be balanced with the necessity for IT managers to control file-sharing intelligently. IT managers need to better understand who their users are exchanging information with, why they are doing it, and what type of tools they prefer to use. In this way they can better understand where they stand and how best to PAGE 7 OF 10
8 help the situation. Fortunately, companies do not have to choose between risky behaviour and productivity. Using the right technologies can give employees the convenience, ease of use and speed they need while IT managers retain the control, visibility, security and compliance. It is a win-win situation. PAGE 8 OF 10
9 FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. PAGE 9 OF 10
10 RELATED TECHTARGET WEBSITES PAGE 10 OF 10
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting
Hybrid cloud computing explained
computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted
Is Your Data Safe in the Cloud?
Is Your Data Safe in the? Is Your Data Safe in the? : Tactics and Any organization likely to be using public cloud computing are also likely to be storing data in the cloud. Yet storing data in the cloud
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.
E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE
E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE W orking with individual in hybrid cloud can be complex, but Quality of Experience can be
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level
Securing the SIEM system: Control access, prioritize availability
The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is
MDM features vs. native mobile security
vs. : Mobile device management or MDM plays a critical role in, but should always trump native security features of mobile devices? Lisa Phifer weighs in on how to choose the best approach for your workforce.
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal
Evaluating SaaS vs. on premise for ERP systems
Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn
3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES I n this E-Guide, Mike Chapple; a Search- Security.com expert discusses the new PCI Mobile Payment Acceptance Security Guidelines
HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT
E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage
5 free Exchange add-ons you should consider Eliminating administration pain points on a budget
5 free Exchange add-ons you should Eliminating administration pain points on a budget There are countless cost-free ways to supplement the basic features that come with Exchange and that help to streamline
HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO
E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor
Expert guide to achieving data center efficiency How to build an optimal data center cooling system
achieving data center How to build an optimal data center cooling system Businesses can slash data center energy consumption and significantly reduce costs by utilizing a combination of updated technologies
BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS
E-Guide BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS SearchSolidState Storage A ll-flash storage arrays are becoming Tier-1 storage for mission-critical data. This e-guide showcases the progression
Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment
Creating new virtual data center design options Top four for deployment New features of Hyper-V provide IT pros with new options for designing virtual data centers. Inside this e-guide, our experts take
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age
Benefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE
Solution Spotlight GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE SearchFinancial Applications selection C hoosing the right can be challenging, especially as purchasing has evolved to encompass the basics
Software Defined Networking Goes Well Beyond the Data Center
Software Defined Goes Well Software Defined Goes Well Software-defined networking (SDN) is already changing the data center network, but now the technology could redefine other parts of the network, as
Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration
Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare
Managing the supply chain for SAP
Managing the supply chain for SAP Supply chain projects around collaboration with suppliers, contract lifecycle management and transportation management can provide a quick return on investment (ROI) for
Supply Chain Management Tips and Best Practices
Supply Chain Management Tips and Best Practices According to Aberdeen Group, as companies seek to contain or cut supply chain management (SCM) costs, they are prioritizing increasing supply chain visibility,
Top 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
Order Management System Best Practices
Order Management System Best Practices For most organizations, order management taking, fulfilling and shipping orders is far from simple. In fact, there are some common holes in order management software
Skills shortage, training present pitfalls for big data analytics
present pitfalls for big The biggest challenges related to big data analytics, according to consultants and IT managers, boil down to a simple one-two punch: The technology is still fairly raw and user-unfriendly,
BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS
E-Guide BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS SearchHealthIT W ith a focus on, the next wave of EHRs will incorporate powers of big data, speech recognition and new database models. This eguide
Managing Data Center Growth Explore Your Options
Managing Growth Explore Your Options Managing Growth: Managing The increasing demand on data centers has forced many IT managers to look for new ways to manage data center growth, either by consolidating,
Best Practices for Database Security
Database Security Databases contain a large amount of highly sensitive data, making database protection extremely important. But what about the security challenges that can pose a problem when it comes
Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends
A Podcast Briefing produced by Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends Sponsored By: Key Trends in the Identity and Access Management Market
How To Protect Your Online Backup From Being Hacked
Cloud Backup: Pros, Cons, and Cloud backup has taken the storage world by storm, and most IT professionals have given some serious thought to implementing it. But before you get started on your cloud backup
HR Managers Focus on Recruiting Experience as War for Talent Intensifies
HR Managers Focus on Recruiting Experience as War for Talent Intensifies In today's competitive market for quality talent, it s just as important for the business to make a lasting impression on candidates
How to Define SIEM Strategy, Management and Success in the Enterprise
How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have
LTO tape technology continues to evolve with LTO 5
with LTO 5 Despite the predictions from industry experts, tape isn t dead yet and it continues to serve as a low-cost option for long-term storage for many organizations. Like all data center technologies
Social media driving CRM strategies
Rapid changes in social computing, mobile and customer analytics are driving shifts in. In a recent survey, IT identified establishing a CRM strategy as the second greatest challenge, behind instituting
Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY
Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY C ontinuous delivery offers a number of opportunities and for organizations. By automating the software buildtest-deployment
Exchange Server 2010 backup and recovery tips and tricks
Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering
Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.
Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution. TABLE OF CONTENTS WELCOME INTRODUCTION... 1 TIP 1:... 4 Ensure Ease-of-Use TIP 2:... 6 Empower Secure
Virtualization backup tools: How the field stacks up
tools: How the field Searching for the right virtual backup tools can be a grueling process. While there are plenty of available options, you must make sure to select the most effective products for a
Advantages on Green Cloud Computing
Advantages on Green Advantages of Green A growing number of organizations are becoming more green-conscious as there are several advantages of green IT. In this e-guide, brought to you by SearchDataCenter.com,
5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier
5 ways to leverage the free VMware Key tips for working around the VMware cost barrier While a free VMware virtualization setup only provides a limited list of features and functionalities, the shortcomings
Cloud Security Certification Guide What certification is right for you?
What certification is right for you? This exclusive guide examines the available cloud security certifications that can translate to better career opportunities -- and a higher salary -- for you as cloud
BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works.
BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already
E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES
E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES A ccording to Forrester Research, e-commerce efforts will bring in $280 million in 2015. Companies who want a part of this growing market will
The skinny on storage clusters
The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across
SAP White Paper Enterprise Mobility
SAP White Paper Enterprise Mobility Mobile Content and Document Management Best Practices and Decision Checklist Enterprise-Grade Solutions Give IT Much-Needed Security and Control Over Company Content
E-Guide MOBILE DEVICE MANAGEMENT CHECKLIST
E-Guide MOBILE DEVICE MANAGEMENT CHECKLIST Ensure A well thought-out management strategy is a key ingredient for any successful mobility deployment. This expert E-Guide highlights a management. Additionally,
7 remote office backup options: Which is right for you?
7 remote office backup options: Which is right for you? Data protection for remote and branch offices has always been on top of the pain point list for storage administrators. However, with a recent uptick
