{"id":2374,"date":"2014-09-02T11:58:04","date_gmt":"2014-09-02T11:58:04","guid":{"rendered":"https:\/\/fitechllc.com\/in-the-news\/in-the-news\/?p=2374"},"modified":"2024-12-06T16:50:41","modified_gmt":"2024-12-06T22:50:41","slug":"are-you-undermining-your-companys-digital-security","status":"publish","type":"post","link":"https:\/\/fitechllc.com\/in-the-news\/are-you-undermining-your-companys-digital-security\/","title":{"rendered":"Are You Undermining Your Company\u2019s Digital Security?"},"content":{"rendered":"\n<p>You\u2019ve invested in firewalls, heavy-duty spam filters and other security measures to keep your organization\u2019s network and information as protected as possible. But how do you balance that need for security with the file-sharing demands of your operation?<\/p>\n\n\n\n<p>As noted in an\u00a0Infoworld article, some of the technologies that many companies use to share data on a regular basis are disrupting the very security measures that have been put into place. Popular computer-sharing tools such as GoToMyPC, LogMeIn, and file-sharing\/collaboration solutions such as Dropbox, Google Docs or MS SkyDrive are excellent in terms of their purpose; however, because they are outside the company\u2019s network, they can pose serious threats to the security of your data. This is especially true when you must share information with external partners, potential clients or other non-employees.<\/p>\n\n\n\n<p>Back in the old days, a person would have to be on your premises, using your computers to steal information (by copying it onto floppy drives or USB sticks). Now\u2014even with privacy filters installed, as they often are in finance departments\u2014anyone can download information into a cloud-based file storage program where it is available for the taking without anyone tracing it.<\/p>\n\n\n\n<p>So how can a company protect its intellectual property in a cloud-based work environment, without sacrificing the mobility and flexibility that the cloud provides?<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Implement a virtual private network (VPN).\u00a0<\/strong>These private data networks provide excellent protection against cyber intrusions of confidential information. A\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/2030763\/how-and-why-to-set-up-a-vpn-today.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">VPN tunnel<\/a>\u00a0is a more secure option that is set up firewall-to-firewall and allows workers to access files remotely. It can be set up site-to-site, office-to-office. Through the VPN, employees and other authorized users open a piece of software that sets up a \u201ctunnel\u201d\u2014an encrypted connection to other computers\u2019 firewalls that allow for secure transfer of data.<\/li>\n\n\n\n<li><strong>Install a\u00a0<\/strong><a href=\"http:\/\/searchvirtualdesktop.techtarget.com\/definition\/virtual-desktop\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>virtual desktop<\/strong><\/a><strong>.\u00a0<\/strong>This is an excellent alternative to LogMeIn or GoToMyPC, which allow for remote takeover of your computer. These programs make troubleshooting and file sharing very convenient but beware: they are installed on your company machines and operate completely outside your company\u2019s firewalls and other security measures; your IT department has no ability to track who is using those programs and when (or where), making it very easy for someone to sync and steal your files. With a virtual desktop your information is stored at a data center, saved in a secure manner, and it can\u2019t be stolen. Users access it through a dashboard with secure logins and authorizations.<\/li>\n\n\n\n<li><strong>Invest in corporate software that provides file sharing<\/strong>. There are many corporate products available that offer Dropbox-like functionality within your company\u2019s network security protocols. These software packages don\u2019t duplicate data, it protects your data while allowing remote file syncing and availability of the files on tablets and smartphones. You can also control the sharing process and block prohibited users.<\/li>\n<\/ol>\n\n\n\n<p>Don\u2019t spend lots of hard-earned dollars on IT, and then fall under a false sense of data security. For a nominal difference in cost, you could implement more theft-proof solutions instead (and rest easier knowing your intellectual property is safer). After all, you\u2019ve installed thousands of dollars worth of intrusion prevention software for your corporate network\u2014why leave it open to cyber theft when you don\u2019t have to?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You\u2019ve invested in firewalls, heavy-duty spam filters and other security measures to keep your organization\u2019s network and information as protected as possible. But how do you balance that need for security with the file-sharing demands of your operation? As noted in an\u00a0Infoworld article, some of the technologies that many companies use to share data on [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3196,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"off","ocean_gallery_id":[],"footnotes":""},"categories":[219,50],"tags":[249,61],"class_list":["post-2374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-brand","category-business","tag-cyber-security","tag-security","entry","has-media"],"_links":{"self":[{"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/posts\/2374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/comments?post=2374"}],"version-history":[{"count":1,"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/posts\/2374\/revisions"}],"predecessor-version":[{"id":3600,"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/posts\/2374\/revisions\/3600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/media\/3196"}],"wp:attachment":[{"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/media?parent=2374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/categories?post=2374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fitechllc.com\/in-the-news\/wp-json\/wp\/v2\/tags?post=2374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}