7 Risks of Dropbox to Your Corporate Data

Similar documents
7 Risks Dropbox Poses to Your Corporate Data

The Challenge of Securing and Managing Data While Meeting Compliance

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data?

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

HIPAA Security Alert

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

Why Endpoint Backup Is More Critical Than Ever

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Better protection for customers, and recurring revenue for you!

The Cloud App Visibility Blindspot

Note: Support: Never use your TruMobi application for personal use.

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

Third Party Security Requirements Policy

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

efolder White Paper: 3 Little-Known Risks Associated with Leading Cloud Services

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

A number of factors contribute to the diminished regard for security:

Mobilize SharePoint Securely: Top 5 Enterprise Requirements

Security Architecture Whitepaper

WHITE PAPER SPON. Do Ex-Employees Still Have Access to Your Corporate Data? Published August 2014 SPONSORED BY. An Osterman Research White Paper

HIPAA Privacy & Security White Paper

Network & Information Security Policy

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere

Security Overview Enterprise-Class Secure Mobile File Sharing

Risk Assessment Guide

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Don t Let A Security Breach Put You Out of Business

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

A HELPING HAND TO PROTECT YOUR REPUTATION

Minimizing Computer Data Loss Risks With Online Backup. Seven Devastating but Common Computer Backup Mistakes

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

5 Things You Didn t Know About Cloud Backup

For your eyes only - Encryption and DLP Erkko Skantz

Cloud Backup and Recovery for Endpoint Devices

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

FileCloud Security FAQ

Bring Your Own Device Policy

12 Security Camera System Best Practices - Cyber Safe

How VDI Reduces the Risks of BYOD

Comparing Dropbox and Egnyte. White Paper

MDM and beyond: Rethinking mobile security in a BYOD world

BYOD. Bring Your Own Device - Mobile Device Management.

10 Smart Ideas for. Keeping Data Safe. From Hackers

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Security Is Everyone s Concern:

Computer and Network Security Policy

Symantec Endpoint Security Management Solutions Presentation and Demo for:

SOOKASA WHITEPAPER HIPAA COMPLIANCE.

AB 1149 Compliance: Data Security Best Practices

Security Basics: A Whitepaper

Information Security for the Rest of Us

Data Protection Act Guidance on the use of cloud computing

Information Security. Annual Education Information Security Mission Health System, Inc.

The Essential Security Checklist. for Enterprise Endpoint Backup

Passing PCI Compliance How to Address the Application Security Mandates

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

SOOKASA WHITEPAPER CASB SECURITY OVERVIEW.

PCI DSS COMPLIANCE DATA

Multi-factor Authentication Security Enhancement

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Transcription:

7 Risks of Dropbox to Your Corporate Data

Introduction We live in a world where information equals power. With the influx of online file-sharing solutions, distributing information has become easier than ever. As a result, it is now easier for information to fall into the wrong hands intentionally or unintentionally. - Enterprise file sync-and-share, Terri McClure, Kristine Kao, TechTarget Bring-your-own-device (BYOD) policies and an increasingly mobile workforce are putting new pressures on IT and changing the requirements for how workers want (and need) to access corporate data. With over 200 million users, Dropbox has become the predominant leader for mobile file access. Unfortunately, what works for family pictures does not work with corporate files. In most cases, Dropbox quick to install, easyto-use, consumer services present unacceptable security, legal and business risk in a business environment. Here are 7 Risks of Dropbox to Your Corporate Data. *All marketing claims refer to Dropbox Basic version 2.6.30 as of April 18, 2014

01 Data theft Most of the problems with Dropbox emanate from a lack of oversight. Business owners are not privy to when an instance of Dropbox is installed, and are unable to control which employee devices can or cannot sync with a corporate PC. Use of Dropbox can open the door to company data being synced (without approval) across personal devices. These personal devices, which accompany employees on public transit, at coffee shops, and with friends, exponentially increase the chance of data being stolen or shared with the wrong parties.

02 Data loss Lacking visibility over the movement of files or file versions across end-points, Dropbox can improperly backup (or not backup at all) files that were modified on an employee device. If an endpoint is compromised or lost, this lack of visibility can result in the inability to restore the most current version of a file or any version for that matter.

03 Corrupted data In a study by CERN, the European Organization of Nuclear Research, silent data corruption was observed in 1 out of every 1500 files. While many businesses trust their cloud solution providers to make sure that stored data maintains its integrity year after year, most consumer file sync services do not implement data integrity assurance systems to guarantee end-to-end data integrity of the data, guarding against silent data corruption that has been shown to be common in large-scale storage systems.

04 Improper Data Handling Dropbox gives carte blanche power to employees over the ability to permanently delete and share files. This can result in the permanent loss of critical business documents as well as the sharing of confidential information that can break privacy agreements in place with clients and third-parties.

05 Compliance violations Many compliance policies require that files be held for a specific duration and only be accessed by certain people; in these cases, it is imperative to employ strict control over how long files are kept and who can access them. Since Dropbox has loose (or non-existent) file retention and file access controls, businesses that use Dropbox are risking a compliance violation.

06 Loss of accountability Without detailed reports and alerts over systemlevel activity, Dropbox can result in a loss of accountability over changes to user accounts, organizations, passwords, and other entities. If a malicious admin gains access to the system, hundreds of hours of configuration time can be undone if no alerting system is in place to notify other admins of these changes.

07 Loss of file access Dropbox does not track which users and machines touched a file and at which times. This can be a big problems if you are trying to determine the events leading up to a file creation, modification, or deletion.

Conclusion Dropbox poses many challenges to businesses that care about control and visibility over company data. Allowing employees to utilize Dropbox can lead to massive data leaks and security breaches. Many companies have formal policies or discourage employees from using their own accounts. But while blacklisting Dropbox may curtail the security risks in the short term, employees will ultimately find ways to get around company firewalls. The best way for business to handle this is to deploy a companyapproved application that will allow IT to control the data, yet grants employees the access and functionality they feel they need to be productive. If you would like more information on FirmShare SM, please contact us at: Phone: 602-412-5025 Email: sales@totalnetworks.com