Lack of true threat visibility distorts secure file sharing efforts

Nov 11, 2014

2015-02-19 Security.jpgWhen it comes to protecting sensitive data, organizations cannot become too complacent in their security measures – if they do, they can miss out on the signs of an impending breach. Businesses are constantly putting their information at risk in cloud online file storage and when using mobile initiatives, but there are ways to protect both of these environments. However, while safeguards are readily available, many companies prefer to rely on their current infrastructures and may not consider the potential severity of future breaches and incidents.

The recent onset of high-profile attacks has reminded business leaders that any firm can be targeted by malware, hackers and other threats. However, according to new research, enterprises are becoming more confident in the strength of their security implementations. The study conducted by the Ponemon Institute and FireMon revealed a significant issue – 66 percent of C-level executives believed they had a high perception of their security, while 60 percent of IT staff noted that they only inform these managers when the risk is serious, or not at all. The situation is made more unclear by the fact that IT security members often leave out negative facts more than half the time. When organizations are adopting online file sharing and other innovative technologies, they accept that they may be a chance of risk, but the general lack of communication between the two parties increases the chances of a significant attack occurring.

“The biggest issue is that IT security teams are flying blind,” said Jody Brazil, president and CTO of FireMon. “In a threat environment that is ‘always on’ and aggressive, teams must have the ability to automate and continuously monitor and assess dynamic network environments, and be equipped with proactive tools to provide predictive and prioritized intelligence on an ever-shifting risk profile.”

Protecting essential assets
While the threat to sensitive information is still rising, much of it is now being focused on mobile use, making it necessary to protect these devices. By establishing an enterprise app store, organizations can provide users with a variety of whitelisted applications like mobile file sharing programs and other necessary software to simplify employee duties. ZDNet contributor Joe McKendrick noted that this type of platform will help enhance security, drive adoption of approved systems and boost the overall manageability of their mobile environments. IT staff will then have better oversight into where sensitive files are and how they’re being used. This ensures that no unauthorized parties are able to view the documents and this substantially reduces the chances of leaks and stolen information. The availability of the app store will also help better support current processes while innovating operations for better efficiency and productivity.

“Increasing access to services, applications and APIs that have already been vetted, tested and improved by other business units also means access to processes and procedures may already align to the business’s goals. For example, a purchase order service or API already will conform to business policies,” McKendrick stated.

Category: Data Security