Virtually every week another high-profile breach of sensitive data is reported in the news. Hackers used to be anti-social, shady nerds in hoodies – today they are international, sophisticated crime gangs and malicious state actors.
“But we’re using extremely well known and popular online ‘secure’ file sharing solutions”, I hear you say (think?). “Our data must be safe because these brands are not only popular, they are also backed by some of the world’s biggest technology companies that heavily promote a high level of data security.”
Well, you may want to reflect again after you have read this short article.
I think I already know the answer to this question but please indulge me and allow me to ask...“Do you ever read the fine print when agreeing to the terms and conditions of the user-friendly cloud-based file sharing and ‘secure’ document collaboration products you (and potentially your whole organization) are using?”
Gulp!
If you do take the time to read the fine print before agreeing to the ubiquitous T’s and C’s I’m betting you may have some reservations.
Particularly if you are sharing and / or storing highly confidential and sensitive data.
Cutting to the chase, in no particular order, here are a few of the general terms you are agreeing to when you use products like SharePoint, OneDrive, Google Drive, MS Teams, and Zoom.
If you’ve read this far, I’m guessing you may be somewhat concerned about what you have agreed to.
I know I was.
Let’s face it, we do it because it’s easy and take comfort in the fact that the brands are well known and have many users.
It’s analogous to consumption of the very well known and heavily promoted soft drink brand that many of us purchase and drink (unfortunately, me too) that medical experts warn is close to poison! Most of us know that if you want to be healthy you’re far better off drinking water (but don’t)!
I’m very glad my adult children get this.
In the same way, if you truly care about the security of your shared sensitive and confidential data you are far better off using a solution that doesn’t just promote security but is secure-by-design with military-grade encryption, meaning it has been built from the ground up with security as priority #1 and not as an add on.
True security means that your shared data is never vulnerable or compromised and that not even the service provider has access to it (no need for the exonerating fine print).
If you would like more information, you can request a copy of the report “Secure-by-Design Foundations” written by the Australian Signals Directorate on the importance of choosing the right products, including secure file sharing solutions for your organization here: https://www.cyber.gov.au/resources-business-and-government/governance-and-user-education/secure-by-design
To learn about why highly security conscious organizations such as law enforcement, government agencies, defense primes, and organizations in the critical infrastructure sector use the DekkoSecure secure-by-design platform and ensure complete security and integrity of your shared sensitive data please contact us today, www.dekkosecure.com.