Skip to content

IT security overwhelmed by online attackers

by on August 7, 2012

For the longest time, corporate society has looked at the technical world as the sole responsibility of information technology specialists, engineers and other personnel trained to work with computers and high-tech gadgets. Maintaining the age-old paradigm of separation of jocks and geeks, these nerds have been sequestered to their own quarters and thus don’t communicate openly or frequently with other teams.

The problem is, the job of IT today touches every other department in the company, and if there’s no cross-talk going on, there’s no progress. Making backup tape software count in the fight against online theft won’t be easy unless everyone is on-board.

The weight of the issue

To better-grasp how tenuous IT balancing acts have become, the amount of analytics present online is suffocating. DropBox, LinkedIn and other smashed-together company names have been victimized in recent months, leaving thousands of users in peril and questioning whether their information was compromised or not.

These attacks have led IT staffers to stand behind tape tracking as opposed to cloud storage, coming up with a system that’s easier to isolate and less open to online threats. The resistance from the rest of the workplace community has been remarkable, however, with other uninformed employees turning to these free Internet tools anyway, despite the risk. Even when warned by their employers, Spiceworks reported most workers prefer online tools -specifically DropBox, which just suffered a massive spam and password-theft attack.

Fighting back

Finding other easy storage solutions may pose a problem for IT personnel, but opening pathways to communication can get the begrudgers on the same page, hopefully dissuading them from continually threatening corporate data.

The ISACA put out a report on IT governance and enterprise security saying that the majority of what’s happening with data theft at work comes down to people doing whatever they want, however and whenever they want to do it. Around 15 percent of employees use their own unsecured devices, fumble with information and leak files that put the company at risk. More than 10 percent call cloud computing a downright risk factor in the workplace, a higher portion than are actively concerned about hackers.

Using tape tracking software can keep backup tape in order, but those drives are useless if management doesn’t talk with IT about how to best implement the solution.

Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: