{"id":4723,"date":"2016-06-07T09:23:00","date_gmt":"2016-06-07T14:23:00","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4723"},"modified":"2016-05-27T13:38:00","modified_gmt":"2016-05-27T18:38:00","slug":"reducing-the-risks-of-file-sharing","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/reducing-the-risks-of-file-sharing\/","title":{"rendered":"Reducing the Risks of File Sharing"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\">Exchanging ideas and sharing information are integral parts of working life. Ever since computers and digital technology became central to the way we work, people have exploited various means of passing documents and files containing text, images, and audio-visual data on to colleagues, suppliers and partners.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">As technologies have evolved, the methods have improved. Hard copy and floppy disks gave way to CD-ROM and DVD; USB is gradually giving way to Bluetooth, infra-red, and wireless transmission over the Internet.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">All well, and good. But insecure methods of data transmission and lax practices in the way that media and information are handled may pose as big a threat to corporate security as actual cyber-assault. <\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In this article, we\u2019ll be looking at some of the issues surrounding current file sharing practices, and how the processes may be made more secure.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Various Methods are Employed\u2026<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_stealingdata.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4751 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_stealingdata.png\" alt=\"FileSharing_stealingdata\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_stealingdata.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_stealingdata-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_stealingdata-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Besides printouts, playback recordings, and removable media like flash drives (which all have their use, in specific circumstances), file sharing typically occurs between digital devices in one of two major ways.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In peer-to-peer transmission, data is transferred between systems via a network \u2013 which could be a corporate intranet or the larger Internet.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">File synchronisation and transmission occurs through application software, on websites, through wireless and Bluetooth connectivity, or via email or file-sharing platforms hosted in the Cloud.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>There Are Benefits\u2026<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With flexible hours, changing work patterns, and many organisations having remote or mobile staff, it\u2019s important for workers to have access to the information they need to do their jobs, wherever they are, and whenever they need it. They also need to be able to communicate with clients, partners, and suppliers. File-sharing enables this, and with mobile connectivity and live platforms, exchanges of data may be made in real time.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Being able to exchange information in a timely and efficient manner is not only convenient for the users in that moment: it frees up time for them, that may be productively spent on other activities.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">There are cost savings, too. Not being required to provide physical storage facilities for all their data on site allows organisations to save on floor space (and associated rental charges), as well as on hardware and data storage media. These economies typically have a knock-on effect, that results in reduced overheads and operating costs for the enterprise as a whole.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>And Risks\u2026<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The reliability of the data being transmitted is only as good as the file storage and sharing infrastructure through which it passes, and the security measures put in place to protect it. Unless these are all solid, there\u2019s the risk that the integrity of the data you exchange may be compromised. If the files you\u2019re sharing have been tampered with, are inaccurate, or are simply degraded or corrupted to the extent that they\u2019re unreadable, any decisions based on this information are also thrown under suspicion.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Organisations that opt for file-sharing may also put themselves under the scrutiny of those who wish to exploit their data for their own ends \u2013 either by stealing it, spying on it, or through <a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_risk.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4750 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_risk.png\" alt=\"FileSharing_risk\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_risk.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_risk-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_risk-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a>outright assault via malware or phishing. Intellectual property may also become a target, with infiltration of file-sharing platforms and corporate espionage leading to copyright violations,\u00a0plagiarism, or piracy.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Confidentiality is another issue, with the risk that files shared in an unsecured platform may become public \u2013 e.g. by hacker infiltration, or leaked through human error. Sensitive or private information may be revealed, leading to embarrassment, reputational damage, and possible legal consequences. And there\u2019s the real possibility of lost revenue \u2013 perhaps crippling \u2013 if valuable data falls into the wrong hands.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>So Take Measures to Increase File Sharing Security:<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">This is by no means an exhaustive list, but the following recommendations should assure you of greater file security.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>1. Choose Your File-Sharing Platform With Care<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Popular Web-based file storage services and collaboration platforms like Dropbox or OneDrive are market leaders for a reason: everyone uses them. Sadly, this also includes hackers and spies \u2013 so be careful what your organisation puts out on these high-profile and high-visibility sites.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Some enterprises impose a blanket ban on their employees using free cloud-based storage for business purposes. You might consider a hybrid approach, with low-sensitivity documents cleared for sharing and collaboration on public cloud platforms, while classified or business-critical data is handled on in-house servers and storage facilities.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>2. Use Strong Access Controls<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">User accounts on file-sharing platforms should at the minimum be protected by strong passwords (10 or more characters; a mix of lower and upper-case letters, numbers, and punctuation symbols). And these passwords should be changed at frequent intervals; a month or less is standard.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">To boost account security, consider using multi-part authentication, with usernames and passwords augmented by having to enter additional information to gain access such as a text message code received on a user\u2019s registered mobile phone number.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>3. Use Encryption<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Ideally, data involved in file-sharing operations should be encrypted in transit, and while it\u2019s being stored. Not all services do this, so you\u2019ll need to shop around for one that does.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Different nations impose different rules for encryption grade strength, and the degree of access that government or law-enforcement agencies may legally have to data hosted by third parties. So if you\u2019re working across borders, you should also check on the rights that you\u2019ll have under each jurisdiction that your information passes through.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>4. Manage Your Range of Devices<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Rather then Bring Your Own Device (BYOD), some enterprises provide their workers with an approved range of mobile devices supplied by the company, from which they can select a machine to use for business purposes \u2013 a case of <a href=\"https:\/\/www.getfilecloud.com\/blog\/2015\/11\/how-to-reduce-enterprise-file-sharing-security-risks\/\" target=\"_blank\" rel=\"nofollow\">Choose Your Own Device or CYOD.<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Whichever route you take, your BYOD policy should include firm provisions setting out the range of approved file-sharing practices and platforms, whitelisted applications, and protocols for handling data in the wild. These may include Mobile Device Management (MDM) technologies, and administrative rights to remotely wipe data from machines which are believed to have been compromised, lost, or stolen.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_warning.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4752 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_warning.png\" alt=\"FileSharing_warning\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_warning.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_warning-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/05\/filesharing_warning-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\"><b>5. Educate Your People<\/b><\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Data transmitted through unsecured emails, sharing of passwords, conducting business transactions on public Wi-Fi, and using unsecured websites or mobile applications are just some of the security lapses to which workers may be prone, if they don\u2019t know about file-handling security matters.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">So you should train your people on file-sharing and data security. Formal training may be tutor-led, or via eLearning modules, with refreshers, tips, and reminders issued by email.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/digitalguardian.com\/blog\/communicating-data-security-risks-file-sharing-cloud-storage\" target=\"_blank\" rel=\"nofollow\">Many security analysts agree<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> that scaring people into security awareness using horror stories from the media doesn\u2019t work. Rather, privacy and security issues should be illustrated through examples directly related to the members of your organisation, and the way they operate on a daily basis.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">And keep up to date with security matters yourself, by doing online research, keeping an eye on the latest developments, or subscribing to threat intelligence forums.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exchanging ideas and sharing information are integral parts of working life. Ever since computers and digital technology became central to the way we work, people have exploited various means of passing documents and files containing text, images, and audio-visual data on to colleagues, suppliers and partners. \u00a0 As technologies have evolved, the methods have improved. [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4751,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13],"tags":[],"class_list":["post-4723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4723"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4723\/revisions"}],"predecessor-version":[{"id":4756,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4723\/revisions\/4756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4751"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}