Skip to main content

Home/ Corliss Tech Review Group/ Group items tagged Privacy

Rss Feed Group items tagged

The Corliss Review Group: Five Myths About Cloud Privacy - 2 views

started by Queeniey Corliss on 27 Mar 14 no follow-up yet

The Corliss Group Latest Tech Review: 'RIGHT TO BE FORGOTTEN' - 1 views

started by Franchezca Mindaine on 07 Jun 14 no follow-up yet

Corliss Tech Review Group: Google Glass barely alive - 1 views

started by Queeniey Corliss on 02 Dec 14 no follow-up yet

Corliss Group Review Android devices await Heartbleed fix - 2 views

started by Queeniey Corliss on 17 Apr 14 no follow-up yet
1More

5 File Sharing Dangers by the Corliss Group Tech Review - 1 views

  •  
    Sharing files with colleagues and clients should be easy and convenient. What it shouldn't be is a security risk - but it frequently is. Because many small businesses don't have the right file-sharing systems and policies, many turn to unsafe practices that often put both their business's and clients' privacy in jeopardy. Is your business guilty of engaging in dangerous file sharing habits? Here are five you need to watch out for and what you can do about them. 1. Sharing files via email The most obvious dangerous habit is sharing files via email. Just the other day I received a design document from a client as an email attachment. 2. Using consumer-grade cloud solutions Workers around the world are putting themselves and their employers at risk by indiscriminately using unauthorized file sharing services on their mobile and desktop devices - to the tune of $2 billion. With more workers joining the bring-your-own-device (BYOD) revolution and turning to insecure file sharing services like personal Dropbox and Google Drive accounts, the threat is greater than ever. 3. Peer-to-peer (P2P) file sharing P2P sharing is a great technology used to share data over peer networks. It's also great software to get hacked. 4. Using flash drives Flash drives are the easy tool of choice for infection since they bypass network security. If an infected file is on a flash drive and inserted into a system, it can start an infection spread from the PC. 5. Lack of visibility The danger starts when employees take matters into their own hands and engage a file sharing service on their own. The individual making a one-off decision is not going to be thinking of the bigger picture of organization-wide requirements.
1 - 11 of 11
Showing 20 items per page