Balancing the Sharing of Information

CyberSecurity Journal

Subscribe to CyberSecurity Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get CyberSecurity Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Security Authors: Shelly Palmer, Slavik Markovich, Elizabeth White, Greg Ness, Liz McMillan

Related Topics: Cloud Computing, CyberSecurity Journal

Blog Post

Bootlegging, Piracy and Document Management Have Things in Common By @IanKhanLive | @CloudExpo #Cloud

Based on industry statistics, today over 81% of organizations are still using methods that put their organization at risk

No seriously, I mean it. There are serious correlations and similarities between smuggling alcohol and piracy in any form, whether it's the real life bad guys on ghost ships in the seas or digital pirates who download stuff off the internet thinking it's all free stuff while some artist starves to death, or for that matter an enterprise user; quite specifically a certain type of enterprise user. The ones that love free applications and start using them, well and not just use them but spread it to the entire department. You probably have a Bob or Sally or Travis in your department who sends you an innocent link to Dropbox or Google Drive with the Excel file that was too big to send through email. How about that file from accounting that is conveniently shared on Google drive that can be accessed by everyone, including the CFO from his home? Convenient right? Well yes, convenient but also an early preparation to being sued by your customers or probably tens of other people as well. I am really not trying to scare you off but I know this drum has been beaten too many times. Only 19% of organizations have adopted something that does not put their business at risk doing something almost illegal.

Based on industry statistics, today over 81% of organizations are still using methods that put their organization at risk. Ninety-five percent of employees share documents by email. Forty-two percent employees use consumer grade document sharing applications with Dropbox taking the first spot, followed by Google Drive & Apple iCloud, and last but not least Microsoft SkyDrive.

Man in the Cloud (MITC) attacks are now common. Essentially your free cloud service like a Box.net, Google Drive or Microsoft Sky drive is being hacked into based on a token that was generated through the service when you first connected to it. Remember, as we are becoming more intelligent, so are hackers and cyber criminals. It's also public information that Google drive, as an example, had a huge security flaw that enabled the bad guys to hack into your account with a public URL link. Here is an interesting blog post that gathered the thoughts of 34 technology experts and their views on document management and sharing.

Going back to bootlegging and privacy, here is the truth of the matter. It's about the journey; the journey that all of them take to reach their destination, the sacrifices and the tradeoffs that are made during this journey. Consider bootleggers, essentially people who smuggle alcohol. They have drivers to do so, a tradeoff, an end result. They also have risks they undertake, some knowingly and some unknowingly. Their needs, drivers, end results and risk are the same as that of pirates and ultimately a typical enterprise user who values free document sharing applications. They all want to be somewhere; they all have to do something. How about the fact that in the process of going somewhere and reaching their destination, they end up destroying something, something very valuable. How about the intellectual property rights of artists, musicians, creative people who spend a lifetime perfecting their skills, just to be downloaded without their consent and without any monetary compensation? Mass stealing could not get any worse. In fact piracy is considered to be a crime that an entire generation is committing, not just pirates. Isn't that sad? There is a lot more to tell and I will do that in some of my next posts. Purely because this is a very serious matter.

I am running a free webinar tomorrow (Jan 27), speaking about this exact thing where I will go in depth with all three things that Pirates, Bootleggers and Enterprise Users have in Common. Join me if you have the time!

More Stories By Ian Khan

Ian Khan leads Innovation & Marketing initiatives at Solgenia, a global Cloud services provider with more than 3500 enterprise customers globally that includes Top Fortune 100 and Fortune 500 companies. An advocate of Cloud computing and a thought leader driving change within the industry, Ian is a catalyst for collaboration and Cloud solutions.

He has written for multiple industry publications, presented at various industry events worldwide, and brings more than 15 years of in depth technology experience across various industries.

Ian is a PMP Certified Project Manager, MCSE, and an Instrumentation Technology engineer.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.