Accenture News

Nearly One-Third of Citizens Unaware of Digital Government Services, Accenture Survey Finds

Most citizens who use digital government services are satisfied with them ARLINGTON, Va.; July 9, 2019 – The majority (61%) of citizens who use digital government services are satisfied with their experiences, according to results of a multi-country survey from Accenture (NYSE: ACN). However, almost one-third
/
Accenture News

Accenture Completes Acquisition of BCT Solutions

CANBERRA, Australia; July 1, 2019 – Accenture (NYSE: ACN) has completed its acquisition of BCT Solutions (BCT), a privately held technology consultancy that is now a wholly owned subsidiary of Accenture. Terms of the transaction are not being disclosed. The transaction, first announced on June 26,
/
chris-walker

The Security Gap: What Is Your Core Strength?

The Security Gap

You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your content in the cloud is dangerous. The truth is that top tier cloud storage is more secure than most organizations’ on-premises data centers. Consider that most of the high profile data breaches have been on on-premises data centers.

During an Enterprise Content Management (ECM) assessment project, I mentioned to a client (in Canada) that I was willing to bet that some of their users were using consumer file sharing services. There were noddings of heads, murmurs of assent, and an “OMG how does he know?

cloud-client-shocked

(Image Source: Shutterstock)

In a meeting less than five hours after I mentioned it, an executive from one of the stakeholder groups got a call from security stating that her team was violating policy by using a well known consumer grade file sync and share (FSS). This client had deployed an ECM platform; one of the key drivers for the platform was sharing of content among collaborators. Consumer grade FSS services were not supposed to be necessary. One of the key inhibitors is Citrix.

What Options?

cloud-cloudtweaks-comicSo, what do the users do? They email documents to each other. They store stuff on local drives. They get laptops with intellectual property and personal information stolen, and can’t wipe the laptops or recover the content. They use cloud services to store sensitive information. And security struts around proudly thinking they’ve done something. They have; they’ve created a security hole bigger than the one they tried to plug with Citrix.

I mentioned to the client that they may want to use an Enterprise File Syncing and Sharing (EFSS) service. Their Director of IT Infrastructure told me that the executives were scared of any cloud service that stores data in the U.S. because of the PATRIOT act. Really? Do they not know that Canada has an equally odious piece of legislation? Do they not realize that if the U.S. government wants to get at stuff in Canadian data centres they will? And dig this … some of the better known cloud providers have been working on tools that would let the customer (that’s you, btw) maintain control of, and access to, encryption keys. No more sneak attacks by the government. Hey, they can still come to you and ask, but at least you’ll know, no? Can you imagine!?!

Blocking access to file sharing services doesn’t work. People will find other ways to connect (e.g.: phones make great wi-fi access points) or email documents around.

Instead of blocking access to consumer services, IT and security ought to:

  1. find out why staff is using the services in the first place;
  2. identify and provision SECURE enterprise grade services;
  3. develop appropriate policies for using EFSS services, including remedial action for violating the policies.

If staff are using consumer services to share business content, it’s a pretty safe bet something is wrong with the corporately provided tools. Fix them.

Part of the fix may actually be to provision EFSS to staff. Think about this for a moment; EFSS providers make money by providing a secure way for people to share content and collaborate.

How do you make money? What’s your core strength?

By Chris Walker

Chris Walker

Chris is an independent consultant that is involved in the Information and Content Management space. Chris is also a prominent keynote speaker and writer who has published articles on sites such as CMS Wire and Tech Target.

View Website
3 Challenges of Network Deployment in Hyperconverged Infrastructure

3 Challenges of Network Deployment in Hyperconverged Infrastructure

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several ...
Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Protect Your Online Information Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why ...
Cloud Security Tools

10 Useful Cloud Security Tools For Your Business

Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense ...
Object Storage for Your Backups

Don’t be held hostage by Ransomware: 7 Prevention Tips

Ransomware Prevention Tips Ransomware can bring your business to its knees. Whether it comes as a system- or network-wide infection, it can do a severe ...
MIT tech review

A new microchip aims to stump hackers with a constantly moving target

/
Morpheus repeatedly changes key parts of its code to foil cyberattacks Last year’s revelations of security holes that affect billions of chips have spurred researchers to seek more effective ways ...
huawei

Huawei to invest $3.1 billion in Italy but calls for fair policy on 5G: country CEO

/
MILAN (Reuters) - China’s Huawei Technologies said it will invest $3.1 billion in Italy over the next three years, as the Chinese telecoms giant called on Rome to ensure the ...
Tech Crunch

Apple disables Walkie Talkie app due to vulnerability that could allow iPhone eavesdropping

/
Apple has disabled the Apple Watch Walkie Talkie app due to an unspecified vulnerability that could allow a person to listen to another customer’s iPhone without consent, the company told ...

Cloud Community Supporters

ISC2
Amazon
Ring Central
CA Technologies
Cisco

Community support comes from comic licensing, sponsorship, service opportunities and collaborative network partnership initiatives.