{"id":63813,"date":"2015-02-12T20:46:59","date_gmt":"2015-02-13T01:46:59","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-08-26T13:20:57","modified_gmt":"2022-08-26T17:20:57","slug":"25-of-employees-access-past-employers-docs","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/25-of-employees-access-past-employers-docs\/","title":{"rendered":"25% of Employees Access Past Employers Work Docs"},"content":{"rendered":"<p><a href=\"http:\/\/www.cad-notes.com\/task-9-managing-and-sharing-autocad-drawing-files\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98220\" title=\"25% of Employees Access Past Employers Work Doc's\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer-file-management-e1647722714423-150x129.jpg?resize=95%2C82&#038;ssl=1\" alt=\"25% of Employees Access Past Employers Work Doc's\" width=\"95\" height=\"82\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer-file-management-e1647722714423.jpg?resize=150%2C129&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer-file-management-e1647722714423.jpg?resize=75%2C64&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer-file-management-e1647722714423.jpg?w=349&amp;ssl=1 349w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>More than 25%\u00a0of <strong>file-sharing service users<\/strong> report still having <strong>access to work documents from their previous employer<\/strong>, according to a <b>&#8220;Rogue Cloud in Business&#8221; <\/b>survey of 2,000 U.S. adults by <a title=\"Harris Interactive\" href=\"https:\/\/web.archive.org\/web\/20141028170742\/http:\/\/www.harrisinteractive.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Harris Interactive<\/a> for <a title=\"Egnyte\" href=\"https:\/\/www.egnyte.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Egnyte<\/a>, an\u00a0enterprise file-sharing platform provider.<\/p>\n<p><a href=\"https:\/\/teachtechpsd.wordpress.com\/2012\/03\/12\/file-management-with-students\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98222 \" title=\"uncontrolled file-sharing\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/file-naming-copy.png?resize=108%2C90&#038;ssl=1\" alt=\"uncontrolled file-sharing\" width=\"108\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/file-naming-copy.png?resize=150%2C125&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/file-naming-copy.png?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/file-naming-copy.png?w=380&amp;ssl=1 380w\" sizes=\"auto, (max-width: 108px) 100vw, 108px\" \/><\/a><a title=\"One-quarter of US adults continue to access documents from previous employer\" href=\"https:\/\/web.archive.org\/web\/20160604040849\/http:\/\/www.fierceitsecurity.com\/story\/one-quarter-us-adults-continue-access-documents-previous-employer\/2013-11-14\" target=\"_blank\" rel=\"noopener noreferrer\">According<\/a>\u00a0to <a title=\"FierceITSecurity\" href=\"https:\/\/web.archive.org\/web\/20160729153456\/http:\/\/www.fierceitsecurity.com:80\/?\" target=\"_blank\" rel=\"noopener noreferrer\"><em>FierceITSecurity<\/em><\/a>, the survey highlights the <strong>security risks uncontrolled file-sharing<\/strong> practices pose to the work place from these practices are obvious. An Egnyte <a title=\"Employees Go Rogue for File-Sharing Needs\" href=\"https:\/\/web.archive.org\/web\/20131125202351\/http:\/\/www.fierceitsecurity.com:80\/press-releases\/survey-says-employees-go-rogue-file-sharing-needs\" target=\"_blank\" rel=\"noopener noreferrer\">presser<\/a> claims\u00a0The survey results illustrate a major exposure for today&#8217;s businesses when it comes to the transfer and storage of data through <strong>unapproved and insecure cloud-only file-sharing services.<\/strong><\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>The new survey uncovers deep issues around the <strong>rogue usage of consumer-based cloud services<\/strong> and illustrates the need for IT to deploy a secure enterprise-grade solution that meets the file-sharing needs of employees while protecting sensitive business data from the risks associated with insecure file sharing through the cloud<\/em><\/p>\n<h3>The survey found that:<\/h3>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20190101100425\/https:\/\/www.lexiophiles.com\/english\/on-illegal-file-sharing-guilty-pleasures%e2%80%a6\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98224 \" title=\"easy to take sensitive business documents\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lady-e1563757178728-113x150.jpg?resize=90%2C119&#038;ssl=1\" alt=\"easy to take sensitive business documents\" width=\"90\" height=\"119\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lady-e1563757178728.jpg?resize=113%2C150&amp;ssl=1 113w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lady-e1563757178728.jpg?resize=56%2C75&amp;ssl=1 56w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lady-e1563757178728.jpg?w=188&amp;ssl=1 188w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>51% agree that collaborating on file-sharing services (such as <a title=\"Dropbox\" href=\"https:\/\/www.dropbox.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Dropbox<\/strong><\/a> and <a title=\"YouSendIt\" href=\"https:\/\/web.archive.org\/web\/20141227101314\/http:\/\/www.crunchbase.com:80\/product\/yousendit\" target=\"_blank\" rel=\"crunchbase nofollow noopener noreferrer\">YouSendIt<\/a>) is <strong>secure for work documents<\/strong>;<\/li>\n<li>46% agree that it would be easy to take sensitive <strong>business documents to another employer<\/strong>;<\/li>\n<li>41% agree that they could easily <strong>transfer business-sensitive data outside<\/strong> the company using a file-sharing service;<\/li>\n<li>38% have used file-sharing services have transferred sensitive files on an unapproved file-sharing service to someone else at least once;\u00a0<strong>10% have done it 6 or more times<\/strong>;<\/li>\n<li>31% agree that they would share large documents that are too big for email through a file-sharing service <strong>without checking with their IT departments<\/strong>;<\/li>\n<li>27% of file-share service users report still having access to <strong>documents from that previous employer<\/strong>.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/web.archive.org\/web\/20130924045742\/http:\/\/www.hrzone.com\/topic\/strategies\/technology-employees-need-understand-crime-stealing-data\/128338\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98226 \" title=\"mobile users are willing\u00a0to bypass IT policies\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heartland-data-breach-e1563757294614-150x113.jpeg?resize=119%2C90&#038;ssl=1\" alt=\"mobile users are willing\u00a0to bypass IT policies\" width=\"119\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heartland-data-breach-e1563757294614.jpeg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heartland-data-breach-e1563757294614.jpeg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heartland-data-breach-e1563757294614.jpeg?w=423&amp;ssl=1 423w\" sizes=\"auto, (max-width: 119px) 100vw, 119px\" \/><\/a>Another <a title=\"72% of employees stuck with unauthorized file sharing services\" href=\"https:\/\/web.archive.org\/web\/20131125200125\/http:\/\/www.fierceitsecurity.com:80\/press-releases\/72-employees-stuck-unauthorized-file-sharing-services\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> from <a title=\"Workshare\" href=\"http:\/\/www.workshare.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Workshare<\/a> paints a grimmer picture for those of us tasked with protecting a firm&#8217;s intellectual property. The report titled\u00a0<a title=\"AIIM Research Report\" href=\"http:\/\/www.workshare.com\/resources\/whitepapers\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Workforce Mobilization&#8221;<\/a>\u00a0shows the true extent to which mobile users are willing\u00a0to bypass IT policies and use unsanctioned applications to share large files and collaborate on documents outside of the office.<\/p>\n<ul>\n<li>72% of workers are <strong>using free file-sharing services<\/strong> <strong>without authorization from their IT<\/strong> departments.<\/li>\n<li>62% of knowledge workers use their <strong>personal devices for work<\/strong>.<\/li>\n<li>69% of these workers also use free file sharing services to collaborate and access <a title=\"Shared resource\" href=\"http:\/\/en.wikipedia.org\/wiki\/Shared_resource\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">shared documents<\/a>.<\/li>\n<li>At companies with fewer than 500 employees only 24% of employees using authorized file sharing solutions.<\/li>\n<\/ul>\n<p>Robert Hamilton, director of <a title=\"Risk management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Risk_management\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">information risk management<\/a> at <a title=\"Symantec\" href=\"https:\/\/securitycloud.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Symantec<\/a> (<a title=\"NASDAQ : SYMC\" href=\"https:\/\/wp.me\/p2wgaW-pra\" target=\"_blank\" rel=\"noopener noreferrer\">SYMC<\/a>)\u00a0in <a title=\"Mountain View, California\" href=\"http:\/\/maps.google.com\/maps?ll=37.3894444444,-122.081944444&amp;spn=0.1,0.1&amp;q=37.3894444444,-122.081944444 (Mountain%20View%2C%20California)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">Mountain View, CA<\/a> also <a title=\"Most employees don&#039;t view taking corporate data as stealing\" href=\"https:\/\/web.archive.org\/web\/20150918223437\/http:\/\/www.fiercecio.com\/story\/most-employees-dont-view-taking-corporate-data-stealing\/2013-11-06\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <em><a href=\"https:\/\/www.fiercecio.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FierceCIO<\/a>\u00a0<\/em>a continued threat to the company&#8217;s data comes from employees who feel like they live in a &#8220;<strong>finder&#8217;s keepers<\/strong>&#8221; environment.<\/p>\n<h3>Not encouraging<\/h3>\n<p>The results of the <a title=\"What\u2019s Yours Is Mine: How Employees are Putting Your Intellectual Property at Risk\" href=\"http:\/\/www.symantec.com\/connect\/blogs\/what-s-yours-mine-how-employees-are-putting-your-intellectual-property-risk\" target=\"_blank\" rel=\"noopener noreferrer\">survey report<\/a>, entitled &#8220;What&#8217;s Yours Is Mine,&#8221; were not encouraging to IT security professionals and IT management. According to the Symantec survey of employees:<\/p>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20160304065244\/http:\/\/www.ipnav.com\/blog\/rackspace-victim-or-thief\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98228 \" title=\"&quot;finder's keepers&quot; environment\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thief2-e1563757437339-150x126.jpg?resize=106%2C89&#038;ssl=1\" alt=\"&quot;finder's keepers&quot; environment\" width=\"106\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thief2-e1563757437339.jpg?resize=150%2C126&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thief2-e1563757437339.jpg?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thief2-e1563757437339.jpg?w=691&amp;ssl=1 691w\" sizes=\"auto, (max-width: 106px) 100vw, 106px\" \/><\/a>68% of their company doesn&#8217;t take proper steps to protect sensitive work information;<\/li>\n<li>56% do not believe it is a crime to use a competitor&#8217;s trade secrets;<\/li>\n<li>40% download work files to personal devices;<\/li>\n<li>40% plan to use old company information in a new job role.<\/li>\n<\/ul>\n<p>Symantec&#8217;s Hamilton told <em>FierceCIO<\/em>:<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>Employees are taking increasing amounts of data outside the company, and most people do not believe using corporate data for themselves is wrong &#8230; The attitude is that ownership lies with the person that created it, not with the company that employs them.<\/em><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em><a href=\"http:\/\/spotlightbrevard.com\/fix-water-leak-month\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98229 \" title=\"intellectual property from leaking out\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/water-leak-e1563757568743-143x150.jpg?resize=89%2C93&#038;ssl=1\" alt=\"\" width=\"89\" height=\"93\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/water-leak-e1563757568743.jpg?resize=143%2C150&amp;ssl=1 143w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/water-leak-e1563757568743.jpg?resize=72%2C75&amp;ssl=1 72w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/water-leak-e1563757568743.jpg?w=271&amp;ssl=1 271w\" sizes=\"auto, (max-width: 89px) 100vw, 89px\" \/><\/a>All three of these firms sell products they claim that can stop a firm&#8217;s intellectual property from leaking out through public file-sharing services. But before you engage any firm, some basic steps should be taken.<\/em><\/p>\n<ol>\n<li><em>Develop a technology acceptable use policy.<\/em><\/li>\n<li><em>Include public file-sharing services in the <a title=\"Acceptable use policy\" href=\"http:\/\/en.wikipedia.org\/wiki\/Acceptable_use_policy\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">AUP<\/a>.<\/em><\/li>\n<li><em>Incorporate\u00a0the AUP in the staff handbook, and make sure staff sign it before they are given network access.<\/em><\/li>\n<li><em>Train staff on the risks associated with using public file sharing services for sharing corporate documents. Risks include <a title=\"Health Insurance Portability and Accountability Act of 1996\" href=\"https:\/\/searchdatamanagement.techtarget.com\/definition\/HIPAA\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA<\/a> violations, <a title=\"Personally identifiable information\" href=\"https:\/\/web.archive.org\/web\/20200504232422\/https:\/\/searchfinancialsecurity.techtarget.com\/definition\/personally-identifiable-information\" target=\"_blank\" rel=\"noopener noreferrer\">PII<\/a> release, Malware, <a title=\"The Payment Card Industry Data Security Standard\" href=\"https:\/\/web.archive.org\/web\/20200501132614\/https:\/\/searchfinancialsecurity.techtarget.com\/definition\/PCI-DSS-Payment-Card-Industry-Data-Security-Standard\" target=\"_blank\" rel=\"noopener noreferrer\">PCI-DSS<\/a> violations, and <a title=\"Canada Agency Monitors File-Sharing, Reports Say\" href=\"https:\/\/web.archive.org\/web\/20220616161522\/https:\/\/www.nytimes.com\/2015\/01\/29\/world\/americas\/canada-agency-monitors-file-sharing-reports-say.html\" target=\"_blank\" rel=\"noopener noreferrer\">Government &#8220;Snooping<\/a>.&#8221; Only\u00a0then &#8211;<\/em><\/li>\n<li><em>Engage a service provider to implement an enterprise-approved alternative to the free file-sharing services.<\/em><\/li>\n<\/ol>\n<div id=\"attachment_98232\" style=\"width: 490px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.symantec.com\/connect\/blogs\/what-s-yours-mine-how-employees-are-putting-your-intellectual-property-risk\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-98232\" class=\"wp-image-98232 size-large\" title=\"What's Your is Mine\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/b-whats_yours_is_mine-en-us_1.jpg?resize=480%2C1011&#038;ssl=1\" alt=\"What's Your is Mine\" width=\"480\" height=\"1011\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/b-whats_yours_is_mine-en-us_1.jpg?resize=486%2C1024&amp;ssl=1 486w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/b-whats_yours_is_mine-en-us_1.jpg?resize=36%2C75&amp;ssl=1 36w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/b-whats_yours_is_mine-en-us_1.jpg?resize=71%2C150&amp;ssl=1 71w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/b-whats_yours_is_mine-en-us_1.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a><p id=\"caption-attachment-98232\" class=\"wp-caption-text\">Symantec Infographic<\/p><\/div>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/information-machine.blogspot.com\/2015\/01\/new-snowden-ocs-reveal-canada-spying-on.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">New Snowden docs reveal Canada spying on millions of internet users | Jan. 29, 2015<\/a> (information-machine.blogspot.com)<\/li>\n<\/ul>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>25% of past employees use public file sharing sites to take work documents to new employers.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,1795,173,1480,338,2371,2368,1282,550,23,82,421,2370,4,2369,165,1366,1071],"class_list":["post-63813","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-breach","tag-cloud-computing","tag-consumerization","tag-data-center","tag-egnyte","tag-file-sharing","tag-hipaa","tag-intellectual-property","tag-malware","tag-microsoft","tag-msft","tag-pci-dss","tag-security","tag-spying","tag-symantec","tag-symc","tag-theft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/63813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=63813"}],"version-history":[{"count":27,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/63813\/revisions"}],"predecessor-version":[{"id":132944,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/63813\/revisions\/132944"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=63813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=63813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=63813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}