Got a Handle on Cloud Security in SharePoint Online, OneDrive, and Yammer? What about Compliance and Records Management Infractions?
The average organization uploads 1.37 TB of data to Yammer, SharePoint Online, and OneDrive each month. That’s the equivalent of 120 million pages of Word documents. And this is only going to increase.
Did you know that Office 365 receives more attempted cyberattacks than any other platform in the world? I hate to burst somebody’s bubble, but 17.4 percent of those documents contain sensitive data. What are organizations waiting for? A catastrophic breach, which would force them to clean up their content?
Ok, I am off my high horse now. It just occurred to me that I always don’t ‘do’ what I should. I think that’s called a conscience? The shift to the cloud has opened a Pandora’s Box of weaknesses and vulnerabilities.
Security in SharePoint, SharePoint Online, OneDrive, and even Yammer isn’t the only area that gives cause for concern. Legal teams and records managers should be taking an active role in determining exactly what content is in the cloud. Unfortunately, many companies don’t invest in training, and end users are prone to continuing habits, both bad and good. And we must not forget those in the IT team, who have probably had cloud security dumped in their laps.
There are two choices – either an organization can solve the problem – not very likely, or it can manage the problem. It will have to be the latter. Data loss prevention software lacks flexibility, requires at least one resource, and often requires a great deal of time.
This problem is an excellent example of where the ability to automatically generate semantic metadata and quickly develop a taxonomy on the fly can deliver enormous benefits. Once an infraction is identified – whether its nature is security, compliance, or litigation support – the content in question can be automatically moved to a secure repository for disposition. The crux of the problem remains though. Without accurate and consistent metadata, this is not doable.
How are you handling these issues in the cloud? Does your organization have a devil-may-care attitude, thinking that a breach won’t happen?
Our webinars also address the topics explored in our blogs. Access all our webinar recordings and presentation slides at any time, from our website, in the Recorded Webinars area, via the Resources tab.