11 Aug The Danger of Consumer-Grade File Sync
As a business owner, you have to consistently use cloud-based technology to share sensitive company data with employees, partners, clients and vendors in order to get jobs done quickly and efficiently. However, did you know that Consumer-Grade File Sync services (known as CGFS) store sensitive company data on external servers outside of IT’s control, or even outside the country?
The risks of data leakage, security vulnerability, compliance violations, and business damage are enormous and the results can be devastating. One of the easiest ways to avoid accidental data loss, theft or worse is to avoid using CGFS for your business. Below are some of the risks that these solutions pose in a business environment.
- Data theft
With the popularity of BYOD, business owners lack control over which employee devices can or cannot sync with the company computer. When employees bring their personal devices to coffee shops or public transit, this increases the chance of sensitive company data being stolen.
- Accidental Data loss
If your employee modifies or deletes a file, data loss can be very damaging, especially when files are improperly backed up or worse, not backed up at all.
- Corrupted data
A study by CERN observed that silent data corruption occurs in 1 out of every 1500 files. Most of CGFS don’t have integrity assurance measures in place to avoid corruption of cloud based data.
Consumer Grade File Sync allows end-users to share or permanently delete files. This can result in permanent loss of critical business data, security breach of third-party or client privacy agreements.
- Compliance issues
Compliance violations are a risk in many industries, especially in legal, financial and health care industries. CGFS has very loose file retention and access controls, businesses are violating compliance policy using CGFS in the workplace.
- No accountability
By allowing CGFS in the workplace, you lack the control over changes in user accounts, passwords and other important information. Hundreds of hours of configuration time could be lost if a single malicious admin got access to the file system.
- No history tracking
CGFS don’t let you know which users and computers modify or delete files at which time. If you are trying to find out the events that led up to a file change or deletion, this is a huge problem.