Archive | Data Security RSS feed for this section

Social Media – Do you know your liabilities? What are you doing about security?

Security in the cloud is a consistently discussed topic. But what about your social media activities? How do you train your users, identify non-sanctioned information, and what is your damage control plan? Too much effort you say.  Loose lips sink ships. I’d think twice about that.

In an article posted on CMSNewsWire, Matthew Brodsky, the author focused on the liabilities associated with social media. Interesting topic, specifically since Americans are sue happy. The article, Getting Ship-Shape on Social Media Risks was somewhat of an eye opener, at least to me.

According to the article, “there’s the exposure from vicarious liability, which holds companies liable for what their employees say on social media, whether that’s in the performance of work duties or during their downtime on personal computers on social activity that may or may not be related to their employment.” Let that sink in for a few minutes!

It’s not only the employees. Brodsky recommends involvement with the organizations marketeers who must be up to speed on social media that violates advertising laws and regulations.

In an interview with Ethan Wall, of The Social Media Law Firm, Mr. Wall gave a fictional example of social media gone wrong. “Social media legal risks are not strictly limited to irresponsible teenagers. Just last monththe Securities and Exchange Commission filed securities fraud charges against a trader whose false tweets caused sharp drops in the stock prices of two companies and triggered a trading halt in one of them,” Wall said. The trader supposedly created fake Twitter accounts, making them appear like the accounts of known securities research firms, then tweeted false statements about two companies.

Despite these risks, the known unknowns and unknown unknowns, the corporate investment in social media will of course not slow down, but perhaps a focus on quality the quality that is needed. And don’t forget to consider technology that will proactively identify the threats before they happen. Our products will identify and automatically generate semantic metadata (concepts in context) and auto-classify the content to a taxonomy. Any content that is created or ingested can be included. This catches the breach before it happens.

In the above scenario, the objective was not to harm but to improve his sales – in a stupid way. What about the employee who does seek to harm the organization with an inappropriate tweet? How will you stop it from happening? How will you stop the damage after the fact?

Comments are closed

OneDrive for Business Climbing the Ladder to Success?

Ok, I give up. A few weeks ago, I wrote about authors, presumably subject knowledgeable, that felt obligated to inform us in a slew of articles with their predictions for 2016. Enough already! Here is another one, but does have some interesting points. The article, Cloud, Data Security Remain Top Concerns Heading into 2016, written by David Weldon for Information Management, offered some highlights from an interview with Rajiv Gupta, CEO of SkyHigh Networks.

OneDrive for Business is in fourth place in the race to be first. According to Gupta, “OneDrive for Business will surge in the rankings as companies move to the cloud with Office 365,” Gupta predicts. “Companies have already shown confidence in Microsoft’s cloud platform as a system of record for sensitive information, uploading 1.37 TB per month with 17.4% of files containing sensitive data.” Additionally he said, ““There is still a huge growth opportunity, however: 87.3% of organizations have at least 100 employees using Office 365, but 93.2% of employees still use Microsoft on-premises solutions.” Microsoft has invested over one billion dollars on in security and continues to take security very seriously as a make or break situation. And it is, if you are in fourth place.

Microsoft is moving forward with OneDrive for Business, but if we look at the statistics, even without full participation of employees, the organization is opening big gaps in security. This is very to the point since most data exposures are generated by employees. Without some logical management of the content, and practicing due diligence to protect the organization from malicious or just absent minded employees, the organization can’t reap the benefits of ‘safe’ ubiquitous access. For more information on how OneDrive for Business information can be protected, please click here.


Comments are closed