Online File Sharing And The Importance Of Security

Online File Sharing And The Importance Of Security

Online File Sharing

Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at the office all night. As a trusted member of your company, you are authorized to view this type of data. The question is once you put the data on your laptop and take it home, how secure is it?

Computer-Virus-Statistics

Lost and Stolen Equipment

The Ponemon Institute conducted a survey of 329 organizations that had 86,000 laptops lost or stolen over a one-year period. While physically replacing a laptop is certainly expensive, Ponemon explained that the value of the lost hardware represented only a small portion of the estimated cost. Much more expensive was the value of intellectual property on these laptops and the fees associated with data breaches and statutory notification requirements. The average cost to replace the data on the laptop was $49,246.

Spyware

After working in the IT industry for a number of years, I’ve heard many examples of spyware. Many times, this is a result of, “I let my child use my laptop for a little while, and now it’s infected.

This problem frequently occurs when someone borrows your laptop and accidentally goes to a compromised site that is infected with spyware or maybe a virus. As a result, the laptop can become unstable and has to be rebuilt. According to BrandonGaille.com, 53% of all computer users have had some kind of experience with malware infection. Important files should not become a victim of this catastrophe.

Is Encryption The Answer?

Some businesses see encryption as a way to store confidential business data and protect files. This secures data so that only individuals with the proper software and decryption key can access the information. While this may sound like a great solution, encryption can be difficult to work with in a collaborative professional environment.

Proper decryption tools must be installed on computers in order to decrypt and access the data. Additionally, it becomes very difficult to share files externally as even after the encrypted data has been transmitted; the remote company must have the appropriate decryption tools in order to access the file. This can take time and ultimately slow down your file sharing process.

Online File Sharing – Secure & Accessible Data

Online file sharing is a great option for protecting cloud-based files. Since files can only be accessed with a secure login, approved users are the only ones that can access them. Since the files are stored in the cloud, any viruses that affect your hard drive do not affect your securely stored files.

Online file sharing can provide secure data that is independent of hardware failures, loss, spyware, or other mishaps that can happen to business users on a daily basis. Online file sharing can allow your company to easily share your data between employees while providing the security you need to protect your company’s most important asset; it’s data.

By Charles Mount / CEO of Onehub.com

(Infographic Source: BrandonGaille.com)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…