|By Dirk Zwart||
|December 8, 2010 01:00 PM EST||
If nothing else, Julian Assange was an Internet pioneer for exposing things that otherwise would not have seen the light of day on such a large scale. There have been whistle-blowers and various documents made available to the press and courts in years past, but nothing on the scale and public availability of what WikiLeaks provided. Like opening a can of worms, the potential for copycat sites and rogue insiders trying to make money from stealing internal documents is now unfortunately a lurking reality. A leak of memos and internal reports on such a widespread public forum could be a crippling risk to any corporation if they were the next big leak.
Many of these leaks, like the one announced yesterday involving US Navy intelligence specialist Brian Minkyu Martin, are inside jobs and potentially the hardest to stop. For these, a combination of a “bullet-proof” security policy and a lockdown of anything that looks like a storage device plugged into a USB port could potentially stop many of the amateurs.
However, far more sophisticated cyber criminals are sniffing out electronic transfers without detection for the thousands of files transferred among businesses every day. Surprisingly, many companies are not taking the simple steps to verify that their data and other confidential communications is encrypted – until it is too late.
The question begs, how do we keep ourselves from being the next headline on a site like WikiLeaks? The answers are simple. Centralize your data management, limit access to only the individuals with a constant expressed “need-to-know,” and only transfer information securely whether external or even internally within your company.
One of the better secure file server tools on the market right now is GoAnywhere Services by Linoma Software. I’ve been able to test it on Windows, Linux, Unix (in a VMware environment), and even on an IBM iSeries. Not only was it fast and browser-based, but it provided many levels of role-based and credential-based access for users. The application also provided IP filtering and various triggers that alerted me to file movement and internal or external user activity. The secure file server can also be paired with a reverse proxy DMZ gateway and a managed file transfer application. I tried the managed file transfer application called GoAnywhere Director and was surprised how easy it was to automate, audit and centralize all the data transformation and transfer tasks I needed to do that day.
The notion I’ve been promoting in offices for years is that every file matters. Because of that belief, you need to develop a culture of data security where it is easy and almost fun to exchange information securely (Comrade, have you the microfilm?). Do not put yourself at risk for supplying a WikiLeaks site with their next headline. Remember that there is no compensation for unknowingly providing unsecure information to the masses. Thread an easy-to-use and effective secure file transfer system into the fabric of your data security plan today.
- Innodisk | Efficiencies for Cloud Hardware at Cloud Expo New York
- Join Gartner, IBM, + AWS at AppSphere and save $200 when you register in August!
- In 2014 Big Data Investments Will Account for Nearly $30 Billion - Eventually Accounting for $76 Billion by 2020 End
- Global Cloud Security Market Growing at 15.7% CAGR to 2020: Forecast & Analysis in Research Report Available at ReportsnReports.com
- Video: DevOps and Security
- Worldwide Indoor Location Market Growing at 46.0% CAGR to 2019 Says a New Research Report Available at RnRMarketResearch.com
- Flexera Software's InstallAnywhere 2014 Simplifies Multi-Platform Installation for Physical, Virtual and Cloud Environments
- Mobility News Weekly – Week of August 3, 2014
- Searchmetrics Drives Over 200% World-Wide Growth As More Business Leaders Begin To Recognize The Value Of Search
- Mobility News Weekly – Week of August 17, 2014
- Digital Transformation's Impact on Enterprise Mobility and App Design Strategies
- Web Analytics Market by Solution (Search Engine Tracking & Ranking, Heat Map Analytics, Marketing Automation, Behavior Based Targeting) & by Services (Professional Services, Support & Maintenance) - Worldwide Forecasts & Analysis (2014 - 2019)
- Mobile Commerce News Weekly – Week of August 3, 2014
- Red Hat To Present At Internet of @ThingsExpo
- Mobile Cyber Security News Weekly – Week of August 10, 2014
- Where Are RIA Technologies Headed in 2008?
- Dolphin Announces Open API With Over 50 Add-ons Including Dropbox and Wikipedia
- Cloud People: A Who's Who of Cloud Computing
- 21st century Modern Alarm systems continue to play a key role in various institutions and industries
- SEO/SEM Tips & Tricks: How and When Should You Submit Your Website to Google?
- Cloud Expo 2011 East To Attract 10,000 Delegates and 200 Exhibitors
- Tips For Press Releases in Reputation Management from Industry Veteran Brandon Hopkins
- Yahoo! to Keynote 4th Cloud Expo: Accelerating Innovation with Cloud Computing
- Google Version 2.0: Googzilla - The Calculating Predator
- ManageWP Powers Over 100,000 WordPress Sites Within Three Months of Launch
- Ulitzer’s Amazing First 30 Days in Public Beta
- Google's Competitive Advantage: It Leverages "The Power of Free"
- Ulitzer vs. Ning - a Quick Review
- AOL To Enhance Video Search Engine by Adding RSS Feeds
- Confessions of a Ulitzer Addict