Why Corporate File Sharing Solutions Raise IT Flags
Feb 13, 2014
Technology is advancing at a considerable pace, but programs like corporate file sharing solutions still raise IT concerns. While some of these issues have been mitigated with evolving software, others threats have emerged in the changing technological landscape.
Problems with consistent monitoring
For most organizations, security for data assets remains a top priority, but this information protection is harder to maintain with sharing programs and mobile devices. Wired contributor Jim Liddle noted that the lack of oversight in many solutions does not allow IT to monitorwhere data is traveling or who is accessing it. This could lead to massive leaks and make the information vulnerable to compromises. Liddle suggests integrating a secure corporate file sharing option that provides centralized control, encryption and authorization requirements. These features will not only deter unapproved users from accessing critical data, but also ensure that there are several lines of defense to safeguard company-owned intellectual property.
Concerns over inadequate or lack of policy enforcement
Sharing business files is quickly becoming an asset for many organizations, but IT still has concerns over the viability of corporate file sharing solutions. However, by establishing a strong usage policy, the IT department will be able to have better governance and see that best practices are followed. According to a recent survey by InfoStor and the Taneja Group, 30 percent of organizations had no file sharing policy in place but were planning to develop one, and an additional 26.7 percent had no strategy and allowed users to choose their own sharing applications for business purposes. Without the appropriate corporate file sharing system in place, data will be more easily exposed and could be subject to threats.
“This is extraordinarily risky behavior, and compliance concerns alone are driving file sharing application adoption at regulated business,” the report stated. “IT should provide file sharing applications that enable security and compliance management, file locking and versioning, and controlled user access.”