Corporate Espionage in the Cloud Era

Corporate Espionage in the Cloud Era

Wow!!  That was our reaction when we saw this story about cloud file sync and share that was allegedly used in a case of theft at a law firm. Well, wow and DUH of course this was bound to happen.

Whether this turns out to be really nefarious or not is for the courts to decide, but believe me when I say that this is neither the first time, nor the last time that someone will – for good or bad intent – allegedly use DropBox (and its various me to’s) to illegally access information.  Chances are, some of those 50 + Million DropBox users are doing it as I write this blog.

Imagine this scenario:  You are an attorney working along, and you need to get on the train, but the files you need to keep working are chained to your desktop, in your office, on the network (yes, a desktop in legal land is not uncommon).  Problem is, you need to go somewhere else.  If you want to be a good attorney, you have to work.  But if you want to be a good father, you have to get on the train.  So, what do you do?  You use an online service to access your files over the web, and you take your chances.  You just want to get your job done, be a good attorney by spending a lot of time on the client’s case, while also being a good parent.

Why is this bad?  Because you have no idea where that data is physically residing, no guarantees that it won’t be viewed by administrators at the server side, and certainly, no assurance of the encryption that your IT policy requires for documents outside the firm.  Some might say that IT should block the ports for DropBox.  Really?  That’s not going to solve the problem, it will just make the attorney’s that are the life blood of your firm angry.  What’s the next best solution?  Provide an alternative!

If you can provide an alternative solution, hosted by you, that can give the same sort of access to your users, then you can help mitigate the risk to the firm in a positive, proactive manner.  And this solution isn’t rocket science, it is possible today with ownCloud.  In the case of the legal story above, it would have been simple: that laptop locked in the office would simply not have synced after the attorney was terminated – the files could have been un-shared with the attorney, and gone.  There would have been no espionage other than what sounds like a bad separation.

Now that’s simple.

By Matt Richards

Matt Richard is a product strategist with more than 18 years of experience in the IT industry. During that time he helped dozens of companies create and execute technology strategies, and commercialize new software products. Most recently, he launched Agile Cloud Solutions for CA Technologies, and commercialized SUSE Studio for the SUSE Linux Enterprise business at Novell. Matt has degrees in Mechanical Engineering from Dartmouth College and an MBA in New Product and Venture Development from MIT.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

One Response to Corporate Espionage in the Cloud Era

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Popular

Top Viral Impact

Cloud Infographic: Cloud Computing Growth

Cloud Infographic: Cloud Computing Growth

An excellent infographic provided by AwesomeCloud which predicts a continued high level of growth in the cloud computing industry. Potentially staggering numbers for Public Cloud IT Services of $100 Billion by 2016. Infographic Source: AwesomeCloud About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About Latest Posts Follow Us!CloudTweaksEstablished in 2009,

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and store data. The

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving

Hewlett-Packard Company On-Demand Webinar

Hewlett-Packard Company On-Demand Webinar

Shifting Workloads and the Server Evolution Learn more about the latest industry trends and the challenges customers are talking about. Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and