• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Increasing Collaboration at Work While Reducing Security Risk


By VARINDIA - 2018-12-17
Increasing Collaboration at Work While Reducing Security Risk

Security is your responsibility

 

Employees sharing personal and private data internally and externally is a constant stress area for security teams and IT operators in today dynamic organisational set ups. The proper tools and technology are necessary to make collaboration as seamless as possible, both internally and externally without sidestepping data security.

 

Encouraging Collaboration While Discouraging Shadow IT

 

Ask any manager or any worker what they consider a crucial aspect of a healthy workplace, and you will for sure hear the word collaboration, or its synonym: team work.

 

And why not! Team work is essential to a happy, functional office, and increasing collaboration should always be a priority. With the advent of cloud computing and platform as a service, it gets easier to collaborate every day.

 

But unfortunately, there's a downside to all this. Without the proper precautions in place, an open, collaborative environment can also be an insecure one- especially where sensitive data is involved. And it’s import ant to note that sensitive data doesn’t just mean things like credit card numbers and medical data anymore. We are living in the age of the GD PR and other data protection legislation like the new California Consumer Privacy Act of 2018. Therefore, even a sales spreadsheet that includes phone numbers and email addresses can cause massive compliance issues, fines, and security problems, if handled improperly.

 

With that said, it should be a given that IT wants to make sure everyone can collaborate effectively to get the job done as quickly and effectively as possible. But unfortunately, other departments don’t always see it this way. Too often, OT can be seen as a bottleneck for collaboration or productivity which causes employees to turn to shadow IT to achieve their goals.

 

For that reason, there needs to be a happy and secure balance which it comes to collaboration. End users always favour the tools they are most comfortable using. If it isn’t careful, however, these tools may pose a huge risk to the security of business data. For instance, one of the biggest menaces when it comes to shadow IT is enterprise file sync and share (EFSS).

 

EFSS is one of the most popular types of file sharing tools, but there is a dark side to allowing these tools to flourish in the workplace.

 

What Data Says About Ad Hoc File Sharing

 

The term "Ad Hoc" is Latin and means "for this." The term has evolved to mean something created for the moment in an unplanned way. Left to make the decision for themselves, most end users would choose an ad hoc means of sharing data or documents with peers, customers and partners. They tend to choose the tools they are familiar with such as email, Drop box or Google Drive. They tend not to think about the potential security implications of these choices.

 

As an IT professional, you should be aware of the security and compliance risks associated with Ad hoc file sharing tools. You also need to make sure that the collaboration tools available to your end user s are as convenient and easy-to-use as email and EFSS.

 

Why Do Businesses need to Limit or Replace EFSS?

 

FSS tools are great. Let’s not take away how much EFSS has changed the way people collaborate and share content. It has helped bring cloud storage mainstream, but these tools were designed for personal use, and the corporate use cases were not completely understood at the time of EFSS’s conception. If you consider the security risks involved with end users sharing sensitive data via E FSS, it quickly becomes apparent that a secure alternative is required. Users must be trained to recognize the risk to the company of sharing sensitive data using tools that are not adequately secure or controlled. They then need to be offered a secure collaboration tool to use in cases where the data being shared is proprietary, confidential or controlled by industry regulations.

 

Ironically, if your organization decided to outright ban Drop box or Google Drive, you run the gambit of alienating employees and increasing shadow IT within your business. It’s a double-edged sword. Instead, IT team s should look to limit the use of E FSS and email to moving large non-sensitive files quickly. An example of a great EFSS use case that doesn’t compromise security is marketing materials, such as images and video. But the problem persists that IT can’t properly control and monitor data sent to outside sources via E FSS and email.

 

EFSS and Email are Non-Compliant

 

In many industries, IT teams are forced by regulatory compliance to control and report on exactly who is sharing what data with whom. You would be hard pressed to find a company that didn’t have to meet some form of regulatory compliance. Many of these organizations have already turned to Managed File Transfer as the preferred means of sharing sensitive data. And to provide a similar level of ease of use to end user s as available from tools like email, Dropbox or Google D rive, they rely on Secure Folder Sharing for secure collaboration.

 

Managed file transfer is a tool that allows the encrypted movement of files and folders across the wire and at rest. A proper MFT solutions includes security controls for data in transit as well as visibility to document sharing activities and an audit trail showing the movement of sensitive data.

 

Can Managed File Transfer Support Collaboration?

 

So, we've established the security risks incurred when users collaborate without proper security precautions, but that doesn't mean we want to curb collaboration out right. So how can you create a secure culture without tying your worker 's hands with restrictive policies?

 

The answer is a mix of employee training and finding the right tools for the job. L et ’s start with the training bit. Where sensitive data is concerned, consumer -grade file-sharing solutions simply won't do. You need a Managed File Transfer tool which can secure your data, with end-to-end encryption in transit and at rest, as well as access controls and audit trails that allow you to manage exactly who is allowed to access and transfer sensitive data.

 

Alessandro Porro
Senior Vice President, Ipswitch

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.