Ensuring safe online file sharing
Oct 29, 2013
When employees share files on a regular basis, company administrators are usually concerned about data security. While some efforts may seem overly cautious, these parties are right to be concerned.
File sharing ‘honeypot’
Recently, reports surfaced that an online file sharing website, UploaderTalk, was actually a ‘honeypot’, a term used to describe a platform that collects data on users. According to The Guardian, the owner of the site, known only as WDF, released a statement that the forum was a year-long pirate site designed to compile information about individual end users, file hosters and other websites.
While it is currently unknown what purpose the collected data will serve, users of the site are upset at being “suckered” by WDF, stated the news source. This case is one of many associated with the security risks of unsecured online file sharing. Furthermore, it illustrates the importance of utilizing a secure, reputable platform for business file transfers. When additional steps are taken to ensure safe file sharing, administrators can worry less about data breaches and other related security consequences.
Tips for secure file sharing
Whether file sharing occurs online or in the cloud, employees should ensure data being transferred is not vulnerable to data leakage or infection. According to ComputerWeekly, some systems only protect data while it is within the solution itself. However, data should be encrypted while it is at rest, as well as during the transfer. Furthermore, MSPmentor stated that many companies utilize a single encryption key to secure files across an organization. However, if the key is cracked or jeopardized, everyone in the business, as well as all of their files, are at risk. Therefore, companies should use several different encryption keys to guarantee secure file sharing.
In addition, business administrators should have oversight concerning employees file sharing activities. This way, company higher-ups are aware of what data workers are sharing and where files are being transferred to. At the first instance of suspicious activity, an administrator can nip a security issue in the bud utilizing this kind of strategy.