IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives infosectoday.com Book Proposal Guidelines IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives infosectoday.com Book Proposal Guidelines
Auerbach Publications

Home

IT Performance Improvement

Management

Security

Networking and Telecommunications

Software Engineering

Project Management

Database


Free Subscription to IT Today





Powered by VerticalResponse


Share This Article

 
Noiseless Steganography: The Key to Covert Communications by Abdelrahman Desoky, ISBN 978-1-4398-4621-6, $119.95
Information Security Management Handbook, Sixth Edition, Volume 6, Edited by Harold F. Tipton, ISBN 978-1-4398-9313-5, $99.95
The 7 Qualities of Highly Secure Software by Mano Paul, ISBN 978-1-4398-1446-8, $49.95
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It by Jesse Varsalone and Matthew McFadden, ISBN 978-1-4398-2119-0, $69.95
Cybersecurity: Public Sector Threats and Responses, Edited by Kim J. Andreasson, ISBN 978-1-4398-4663-6, $59.95
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS by Tyson Macaulay and Bryan L. Singer, ISBN 978-1-4398-0196-3, $79.95
FISMA Principles and Best Practices: Beyond Compliance by Patrick D. Howard, ISBN 978-1-4200-7829-9, $79.95

Two Thirds of Senior Management Donít Know Where Their Company Data Is
5 Simple Tips to Ensure They Will in the Future

June 25, 2012 - Research from Varonis Systems, Inc. has found that 67% of respondents say that senior management in their organizations either donít know where all company data resides or are not sure. In addition, 74% of organizations reported that they do not have a process for tracking which files have been placed on third party cloud digital collaboration and storage services. The survey was distributed to the attendees at EMC World and individuals from over 400 companies participated in the survey. With Bring Your Own Device (BYOD)—particularly mobile and tablet devices—and file synch services booming, companies are open to a wave of potential devastation. Files kept on third party cloud services can be lost, misplaced, accessed by unauthorized people or leave the company with the employee, causing data privacy and compliance issues.

Alarmingly, of those that are allowing cloud-based file synchronization services, only 9% of respondentsí companies have a process for authorizing and reviewing access to cloud repositories in place, with another 23% still developing their access policies. The remaining 68% either have no plans in place that they are aware of, or live without formal processes for granting and reviewing access. Without control over access, or knowledge of where potentially sensitive organizational data resides, data is virtually Ďup for grabsí.

Given the risk and operational implications of moving data into a cloud environment, it is hardly surprising that 78% of those surveyed would prefer to use their existing permissions and storage if they were able to provide collaboration and file synchronization services similar to those available in the cloud. Equally, the majority of respondents (57%) reported that BYOD would be more attractive for their organization if they could provide secure access to their internal file shares for collaboration.

"The results clearly show a lack of control by those organizations that have adopted cloud file sync services," said David Gibson, VP of Strategy at Varonis. "The most disturbing findings were the number of companies that report they have no way to track what data is being stored in the cloud, no process to manage access to that data (or plans to do so), and that management doesnít know where enterprise data is stored. This should act as a wakeup call for organizations to develop a conscious strategy to ensure secure collaboration as quickly as possible."

David Gibsonís tips for secure collaboration are:

  • Create an inventory of your most used collaboration platforms to get an overview where data lives, who has access to it, and who is using it.
  • Identify data owners for each data set and have owners perform a preliminary entitlement review to see if data is stored in the right place and if the right people have access to it.
  • Remediate any exposures, such as data that is accessible to too many people or regulated/sensitive content that is stored in the wrong place.
  • Monitor access to all data. This will help easily identity data owners and identify unused data and abuse.
  • Put a process into place that provides secure collaboration for remote employees—including synchronization, mobile device support and extranet functionality—that works within the existing enterprise servers and infrastructure.

© Copyright 2012 Auerbach Publications