Document Security: Cloud Collaboration and Mobility

Document Security: Cloud Collaboration and Mobility

It is no secret that the cloud, combined with today’s mobile technologies, has had a huge impact on how the world does business. The ability to send documents, update presentations and check email from tablets and other mobile devices from anywhere, at any time, offers many cost and time saving benefits. And with Gartner’s recent prediction that more than 100 million media tablets will ship worldwide in 2012, updating and sharing documents on the go will become even more common. As this trend continues to grow, it is important to consider the risks and take the proper steps to protect your company’s most sensitive information.

What are the risks?

There are a few aspects of document sharing via mobile devices that should be considered when determining a company’s level of vulnerability. Companies should ask the following:

1. What happens if an important document is sent to the wrong person by mistake? Over 80 percent of data leaks are accidental. For instance, the wrong recipient can be copied on a sensitive email or an employee could attach the wrong document to an email by mistake.

2. What security measures are in place once a document has left the organization? There are a number of solutions for securing information that is shared internally, but those security measures no longer apply once the document has left the organization. Also, consider what might happen if a hacker or disgruntled employee gains access to the company’s IT infrastructure.

3. What happens if an executive’s laptop or mobile device is lost or stolen? If sensitive information is accessible from the device, it can wind up being leaked to the media or shared with competitors, which can be costly and embarrassing.

Protection that extends beyond the mobile device

If your company issues mobile devices to its employees, you most likely use a mobile device management (MDM) solution, but most MDM solutions do not provide protection for documents that live on tablets and mobile devices. MDM solutions can remotely wipe a device clean, but only if the device is managed by the enterprise. If an employee uses a personal device for business, an MDM solution is completely ineffective. To truly protect a company’s most sensitive information, employ a solution that allows you to have complete control over the lifecycle of a document.

Most data that is shared via tablets and smartphones is done so due to its high priority. Often, this data is mission-critical and would cause great concern if it were to be shared with an outside party. While you can’t prevent an employee’s mobile device from being lost or stolen, you can implement a solution that gives you the ability to destroy the documents contained on the device in the event that the mobile device is compromised. Your document security solution should also allow you to track the lifecycle of a document so you are always aware of who has read, printed or forwarded the information. That way you can track any data breach or leak attempts back to the source and destroy the document at a moment’s notice if needed.

A company’s intellectual property is its most precious resource and businesses need to keep its safety top of mind. The most secure solutions are the ones that will keep up with the ever growing advances in cloud technology, especially when dealing with a mobile workforce.

By Adi Ruppin, Vice President of Business Development at WatchDox

WatchDox is a provider of document control, tracking and protection solutions that enable the confidential sharing of important or sensitive documents in an easy and secure way.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Interesting Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. So much, in fact, that you’re probably getting sick of hearing about it. Here are some interesting facts you might not know about big data via The Visual Capitalist: Big Data got its start in…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

PaaS And IaaS: Rising Champions Of Cloud Computing

PaaS And IaaS: Rising Champions Of Cloud Computing

PaaS and IaaS: Rising Champions of Cloud Computing In the cloud conversation, Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) appear much less than the famed Software as a Service (SaaS). This is not surprising when you consider that a world already populated with built platforms and infrastructure has but to operate…

CONNECT TO THE CLOUD

 

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021