No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Risk

Avoid Data Leaks: Make Content Sharing Safe and Compliant

by Glen Segal
May 27, 2014
in Risk
Avoid Data Leaks: Make Content Sharing Safe and Compliant

A staggering 822 million records were exposed by data breaches in 2013, according to research from Risk Based Security. The frequency and risk of data breaches compels companies to look at their network infrastructure and security processes and take appropriate actions to guard against inadvertent data leaks.

An often overlooked area vulnerable to unintentional data leaks is through the use of free online file sharing and syncing solutions. While most employees never consider using a non-corporate sponsored email system, those same employees would readily collaborate through a free file-sharing tool, because it is easier to use than what is available from their employer. Another risky situation arises when a group collaborates by sharing documents and files over email. Version control quickly spins out of control as the volume of email exchanges skyrockets due to the complexity and volume of the edits and to the number of people involved. Project groups then turn to free, ad-hoc file-sharing and collaboration services, which can lead to serious data leakage problems as content is copied onto non-secure public cloud servers.

Unfortunately, IT departments are often unaware of or turn a blind eye to ad hoc file-sharing activity, which tends to expand as projects and teams grow. Compounding the problem, many of these ad hoc file-sharing solutions offer little or no active user authentication, encryption, file tracking or audit controls. Either through malice or by accident, sensitive data can be disseminated outside of the corporate network without regard to corporate policy or security tools like encryption, content filtering or other security solutions that are likely deployed for corporate-sponsored tools, such as email. Further complicating the risk, many of these ad hoc sharing solutions locate servers outside the country in which the company or users reside, such as a European organization sharing files from a U.S.-based file-sharing service. This may inadvertently subject the users’ data to surveillance or control in unexpected jurisdictions.

The disclosure of sensitive files, lack of audit control or the transferring of data across jurisdictions may trigger a compliance breach, summoning the wrath of the regulator or a class-action lawsuit. The consequences can range from a company-wide audit to fines or criminal litigation. Worse, it is almost impossible to track down those at fault, because many of these ad hoc sharing services do not maintain proper audit trails.

Through conversations with enterprise customers, I know that breaches and other data compromises as a result of free file-sharing tools have happened more frequently than most companies care to admit. IT departments have responded in part by using next-generation firewall technology and web filtering to block certain websites. However, it can be hard to spot each new file-sharing variant. Every day it seems I read an announcement about the launch of the next great file-share and -sync company with a free user program. In addition, the employees using these free solutions may be the CEO or other high-level executives. It takes a brave system administrator to ban unsafe file sharing, even though not speaking up can put the company at risk.

Critical questions

Instead of ignoring the issue at hand, IT departments, security and compliance officers and senior managers should accept that employees need an easy way to collaborate without putting the company at risk. Although there are a plethora of competing products, a set of simple questions will help sort out the products that are up to the task and those which fall short.

1) Will employees be sharing sensitive or confidential information? If the material is sensitive or confidential, then there is a need for encryption both at rest and in transit, whether data is consumed on PCs or mobile devices.

2) Will employees share files and get input from multiple parties in and out of the company and be using different platforms and devices? If yes, then the solution must be extensible inside and outside the company, be usable on PCs and mobile devices, and have features for version control and file backups.

3) Do you need to be concerned with the location of stored information? If this is a concern, the solution must be able to be hosted in the appropriate geography for data sovereignty or in an on-premises private cloud that complies with international regulations.

4) Do you have compliance controls and authentication policies in place for email and other corporate programs?  If so, you will need the same level of controls and tracking for file sharing and syncing solutions as you maintain for your other corporate systems. For security and compliance, it may be essential to enforce an authentication policy or integrate with content-filtering solutions, as well as having a method to track access logs and remove user access when the project ends or if members are no longer with the company or partner community.

The days of turning a blind eye and ignoring ad hoc, BYOD solutions are over.  You should answer these four questions to set your company practices around sharing information to ensure compliance with industry standards and your own corporate policies. Avoid the worst-case scenario of sensitive data leaking outside the company. Take action now and put a compliant, corporate-enforced, secure file-share application in place.


Previous Post

Investment in Compliance Professionals Rising Too Slowly to Meet Increasing Compliance Risk: Deloitte/Compliance Week Survey

Next Post

Compliance and FIFA’s World Cup in Brazil: Why They Don’t Go Together

Glen Segal

Glen Segal

Glen Segal joined Accellion as CFO and Senior Vice President of Finance in December 2002. He has over 20 years experience in finance, fund raising strategy and business development. He was a partner at Mercer Management Consulting and has held finance and strategy positions at GE and GE Capital, Nortel Networks and Bay Networks. Prior to joining Accellion he was CFO of FlowStorm, Inc. where his responsibilities included financial management and planning, fund raising, and administration. He has also served as VP of Finance and Corporate Development at FiberStreet where he spearheaded multiple initiatives in financing, business development and operations. Mr. Segal holds a BA degree in Economics from Whitman College and an MBA from the University of Chicago.  

Related Posts

Fox_DOJ Speeches_f

Analysis of Recent DOJ Statements

by Corporate Compliance Insights
March 23, 2023

DOJ leaders provide insight into agency's plans. Analysis of Recent Statements DOJ Shaping the Future of Corporate Criminal Enforcement What’s...

Fox_2023 ECCP Update_f

2023 Evaluation of Corporate Compliance Programs

by Corporate Compliance Insights
March 23, 2023

Keeping up with 2023 changes to DOJ guidelines. Additions, Deletions & Changes From 2020 2023 Evaluation of Corporate Compliance Programs...

encompass update

Encompass Launches pKYC Maturity Model

by Corporate Compliance Insights
March 22, 2023

KYC automation platform Encompass has unveiled a new perpetual Know Your Customer (pKYC) maturity model designed to help banks improve...

consilio onna partnership

Consilio, Onna Seek to Streamline eDiscovery for Cloud Apps

by Corporate Compliance Insights
March 22, 2023

Legal technology provider Consilio has launched a new platform, Sightline Collect, powered by data management supplier Onna. The platform is...

Next Post
Compliance and FIFA’s World Cup in Brazil: Why They Don’t Go Together

Compliance and FIFA’s World Cup in Brazil: Why They Don't Go Together

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT