Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 5 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Protecting your data from the hidden dangers of free cloud tools

by The Gurus
March 9, 2015
in This Week's Gurus
Share on FacebookShare on Twitter

For several years, “cloud” has been the inevitable trend in the IT space.

Businesses are increasingly rolling out different cloud applications, enabling employees to access information stored in the cloud and instantly share it with geographically dispersed colleagues through their laptops or phones. However, as cloud tools grow in popularity, so do the security risks.

With employees sharing sensitive company and customer data and documents on cloud-based platforms, what can you really do to protect your business, its intellectual property, customers’ data, and ultimately your reputation and bottom line?

The weakest link

Given the huge impact of all things online on our personal and professional lives in the always-connected world, it’s impossible for you to shield your business from all Internet-related security risks.

In fact, a recent report shows two-thirds of project managers can access sensitive data within their organisation, yet only half can easily see who has changed or downloaded a document.

In addition to using their own smartphone or tablet for work, users have adopted a range of different cloud-based tools to help them carry out their work. Recent hacking attacks have illustrated how your business is only as secure as its weakest link – who is traditionally the user.

Unless your employees consist of security experts, they are not likely to be aware of and therefore look out for advanced security features such as two factor authentication when adopting new cloud tools.

Trust, assurance and protection

In the context of cloud tools and online collaboration, IT security is built on three pillars: trust; assurance; and protecting your data with the right security controls. Trust includes things such as the privacy statement and cookie policy of the cloud-based collaboration platform. Assurance is a certification or a stamp of approval from a third party. Protection refers to how all businesses need to be aware and prepare for all aspects of a security threat.

While it may be difficult to protect your company from advanced persistent threats, at the very least you should strengthen the “detect” and “response” aspects of these pillars by keeping an eye on the threat warning signs and having a response plan in place, so that you can detect and respond to attacks, minimising possible damage.

In a perfect world, every cloud solution would adhere strictly to these three pillars. However, that’s not the case when it comes to some free tools. Everything comes at a price, and some solutions’ revenues depend on the data that you store in their cloud. What this means is that some of these companies sell ads based on the content of your data.

Furthermore, they are sometimes the owners of the data that you upload – so your business-critical, sensitive documents are not ‘yours’ in the traditional sense of the word.

The need for some free cloud tool providers to mine the information is the reason why your data sometimes isn’t encrypted on these platforms either. In order for data mining technologies to run efficiently, encryption is not an option for free users; instead security technologies like encryption and secure login are add-ons for paying users.

When it comes to third parties accessing your data, its physical location is also a key consideration. For example, if you are using a US cloud collaboration service with servers located in the US only, your data comes under US legislation, and is accessible to US government agencies such as the NSA.

Tie up loose ends

So what can you do? Ultimately, there is no point in fighting back, as your employees are bound to embrace any tool or technology that will make their lives easier by enabling them to access the data and documents they need whenever, wherever.

The key is to adopt a simple, open, company-wide policy and to achieve a balance between security and user friendliness in any technology choices you make, allowing employees to make the most of cloud-based tools. Tie up loose ends by educating your staff about the issues involved, including the potential dangers of using free collaboration tools.

While they shouldn’t lose trust in the cloud, make sure that employees understand the possible consequences for the business if sensitive customer information or intellectual property land in the wrong hands, such as large fines, a tainted reputation or even a damaged bottom line.

Taking simple measures, such as making sure employees read the small print when signing up to cloud services or letting the IT department know about the tools they’re using, can help ensure your business won’t be at risk.

Breaches are inevitable, but lack of preparedness is not. By making the right technology choices and engaging with your employees, you can turn the potential pitfalls of cloud-based tools into a competitive advantage.

Erkan Kahraman is chief trust officer at Projectplace

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

US seeks 3000 person boost to Cyber Command

Next Post

Feminist blog suffers DDoS attack

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information