Last week, we announced our new FileHubTM feature in a little bit different fashion. Because SmartFile would be at Interop Las Vegas, we decided to release the website isyourdatasafe.com and also the infographic ”Is Your Data Safe?“ The reason that we did this was so that companies would understand how prevalent internal security risks have become. After compiling a lot of data about security in companies, we put together the site using the poster child for internal data leaks: Edward Snowden.
SmartFile recently attended Interop in Las Vegas (or Lost Wages as most know it) to promote our new enterprise file sharing offering. We were there with one intent, to inform the public about how awesome or on-premise file sharing and network management appliance is…and I believe we succeeded! The feedback was overwhelmingly positive and met with great response with a wide variety of business sectors from all over the world.
I’m currently reading Behind the Cloud by Marc Benioff. By the time I got to page four of the book, it introduced a metaphor that really made me think. It describes cloud computing as similar to a utility such as electric. Businesses originally used generators to power their trade. This was costly because you might generate more electricity than you needed and generators are expensive to install. Also, there is a cost to fuel those things. It was only natural for people to move to the electric grid and pay for what they used. This is the model that Cloud Computing and SaaS has followed until now. Continue reading
A major online security vulnerability could put your personal information at risk. This flaw in the security software that is used by millions of websites has been dubbed “Heartbleed” and could expose users’ passwords, credit card information, and emails. Here is what you need to know about it. Continue reading
Internal security risks have been seen in companies of all sizes. An employee taking sensitive business documents without permission of their employers is not new, and a very good example of this is Microsoft. According to Digital Trends, a former employee of Microsoft preleaked a build of Windows 8 and a matching software activation kit to a French blogger in 2012 after receiving a poor performance review, and the scariest part is that he was only caught after the blogger contacted someone else at Microsoft trying to confirm the authenticity of the information. How could an employee steal such important information from such a powerful company and almost get away with it? Continue reading
As the amount of internal security threats grows by 14 percent every year (Cisco Annual Security Report 2014), security should be growing, but it seems as if the opposite effect has happened. Companies are simply accepting that they will be compromised instead of being proactive. According to CNBC, 47 percent of respondents are operating under the assumption they’ve been compromised; with another 5 percent saying they operate under the assumption that if they have not already been compromised, they eventually will be. There are ways to prevent internal risks that can save companies from potential disaster. Continue reading