Online File Sharing And The Importance Of Security

Online File Sharing And The Importance Of Security

Online File Sharing

Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at the office all night. As a trusted member of your company, you are authorized to view this type of data. The question is once you put the data on your laptop and take it home, how secure is it?

Computer-Virus-Statistics

Lost and Stolen Equipment

The Ponemon Institute conducted a survey of 329 organizations that had 86,000 laptops lost or stolen over a one-year period. While physically replacing a laptop is certainly expensive, Ponemon explained that the value of the lost hardware represented only a small portion of the estimated cost. Much more expensive was the value of intellectual property on these laptops and the fees associated with data breaches and statutory notification requirements. The average cost to replace the data on the laptop was $49,246.

Spyware

After working in the IT industry for a number of years, I’ve heard many examples of spyware. Many times, this is a result of, “I let my child use my laptop for a little while, and now it’s infected.

This problem frequently occurs when someone borrows your laptop and accidentally goes to a compromised site that is infected with spyware or maybe a virus. As a result, the laptop can become unstable and has to be rebuilt. According to BrandonGaille.com, 53% of all computer users have had some kind of experience with malware infection. Important files should not become a victim of this catastrophe.

Is Encryption The Answer?

Some businesses see encryption as a way to store confidential business data and protect files. This secures data so that only individuals with the proper software and decryption key can access the information. While this may sound like a great solution, encryption can be difficult to work with in a collaborative professional environment.

Proper decryption tools must be installed on computers in order to decrypt and access the data. Additionally, it becomes very difficult to share files externally as even after the encrypted data has been transmitted; the remote company must have the appropriate decryption tools in order to access the file. This can take time and ultimately slow down your file sharing process.

Online File Sharing – Secure & Accessible Data

Online file sharing is a great option for protecting cloud-based files. Since files can only be accessed with a secure login, approved users are the only ones that can access them. Since the files are stored in the cloud, any viruses that affect your hard drive do not affect your securely stored files.

Online file sharing can provide secure data that is independent of hardware failures, loss, spyware, or other mishaps that can happen to business users on a daily basis. Online file sharing can allow your company to easily share your data between employees while providing the security you need to protect your company’s most important asset; it’s data.

By Charles Mount / CEO of Onehub.com

(Infographic Source: BrandonGaille.com)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

One Response to Online File Sharing And The Importance Of Security

  1. I found this while searching for a trustworthy online file sharing site for our company, but unfortunately it is very hard to differentiate good reviews from sales websites that push their listings to the top of google search pages.  I agree that online file sharing is the way to go, but finding a company to host the data at a fair price is difficult to those not in-the-know

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many agencies have made strides toward hardening their cyber security, outdated IT infrastructure and architecture is…

Methodically Plan Your Cloud Design First

Methodically Plan Your Cloud Design First

Are You Sure You Are Ready For The Cloud: Design For the last few months, we have been discussing getting ready to go to the cloud. We have covered topics such as Financial and Business Security reasons. We have even discussed the type of knowledge you should obtain. This month, we are going to take…

The True Power And Potential Of Wearables

The True Power And Potential Of Wearables

The Power of Wearables The potential of wearable computing for efficiency and innovation is enormous. For business leaders and CIOs, wearable technology represents an opportunity to find more intelligent solutions to real problems and to leverage these devices for the benefit of the organization. But before wearables can successfully realize these expectations, there remain basic…

Cloud Service Provider Selection Considerations

Cloud Service Provider Selection Considerations

Why Cloud Brokers Make Sense Different workloads perform differently on different cloud service providers. Enough so that it is prudent in planning to consider the optimal configuration and the optimal CSP for your solution. Consider this old word problem from years ago. One person can carry two buckets of water. It takes 5 minutes to…

Personal Space And The Internet of Things (IoT)

Personal Space And The Internet of Things (IoT)

The Internet of Things (IoT) There is a long time concept of the personal area network or PAN. For all intent and purposes this is the maximum distance a Bluetooth device can move away from the host and still be functional. As I read the many wonderful pieces on the explosion of IoT and wearable…

Are You SURE You Are Ready For The Cloud?: Security of Business

Are You SURE You Are Ready For The Cloud?: Security of Business

Cloud Business Security Last month I went into the financial side of moving to the cloud. This month I am going to focus on the other main reason I have seen customers migrate to the cloud: Security of business. When I say security, I do not mean username and passwords, but a stability of the environment…

From Startup To Becoming Enterprise Grade

From Startup To Becoming Enterprise Grade

Becoming Enterprise Grade How can an emerging business make a successful transition from selling to SMB customers that fueled their early growth to the enterprise customers that enable long-term profitability? What works with SMB customers often won’t get you a seat at the enterprise table. To make deep inroads into enterprise accounts, you have to…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising