Dealing with data leakage and device proliferation today

Dealing with data leakage and device proliferation today

posted in Cyber-SecurityCyber-Security ● 5 Feb 2014

Data management is an increasingly difficult challenge for IT staff.  The sheer volume of data created, used and stored today was unimaginable just a few years ago and it’s not just the Enterprise that this is affecting. The exponential growth of data is in part due to the consumerisation of IT. IT today is convenient, simple and empowering with a prominent role in the lives of private citizens and nearly all businesses. People are no longer scared of new devices; they want to experience and use them in all aspects of their lives, presenting a pathway to a more productive workplace for staff, yet a headache for IT managers: “Where are employees storing files?” “How are they storing and accessing them?” “Is the device secure?” “What happens if a device is lost or stolen?”

Today’s always on, always accessible culture is set to continue and increase way beyond 2014. Users have expectations of a seamless mobile experience without much concern for potential security flaws. This presents challenges to IT managers who wish to maintain a service rich in features and accessibility yet one which is not detrimental to security. Rather than undertake the arduous and ultimately counter-productive task of trying to limit and control all employees IT access, why not provide a secure, scalable solution that enables the same level of access and productivity?

Redstor’s Centrastor service enables IT administrators to provide company staff with user-friendly file sync and share functionality, giving them the ability to access and collaborate on their files from anywhere. Addressing a wide range of security concerns, Centrastor is readily embraced by employees due to its intuitive interface and seamless access to files across a wide range of device types. Recent surveys suggest the average employee has, on average, 3.5 electronic devices, presenting an ever present risk of loss and/or theft. Centrastor addresses this risk through its remote device wipe functionality. Once a device has been reported lost or stolen, IT staff can log onto the device via the cloud platform and wipe confidential information, eliminating the risk of business data being misappropriated.

Additionally, Centrastor allows collaborative working on documents between internal and external parties, easing the challenge of distributed and remote working environments. Should employees be required to share documents with those outside of the immediate business, Centrastor allows provision of time limited access to files and folders, thus removing the security concerns of other document storage and sharing applications. With Centrastor, IT managers can rest soundly safe in the knowledge that all data is secure and easily managed through an intuitive web interface. Employees benefit from the easy access anywhere storage that increases productivity.

Are you worried about complying with the upcoming data protection reforms? Redstor’s range of secure and encrypted cloud services are already protecting the data of over 10,000 organisations across the UK. Redstor’s Online Backup service ensures data is safely backed up offsite in an encrypted format. Our cloud sync and share service, Centrastor, enables organisations to store and share files securely online from any device with an Internet connection and our CentraStage service enables support providers to guarantee that devices they support are regularly audited, patched and safely up-to-date for effective endpoint management. Our Virtual Disaster Recovery service guarantees to have your systems up and running within minutes following a disaster. To find out more about our services and how we can help you comply with data protection laws and prevent data leakage, please contact us either by giving us a ring on 01189 515 200 or emailing [email protected].

Rise in laptop sales leads to data protection worries

Reading, 6 April 2020 – An unwelcome repercussion of employees snapping up laptops for home working ahead of the coronavirus lockdown has been an even bigger spike in cyber-criminal activity.

Continue reading

O365 cyber attacks stress need for isolated backup

Reading, 17 December 2019 – Office 365 is a prime target for cyber criminals – and it’s not difficult to understand why when Microsoft announced this year that it has more than 180m active commercial users every month.

Continue reading

Redstor to showcase pioneering data management technology at Infosecurity

Reading, 26 July 2019 – Redstor, the UK-headquartered company disrupting the world of data management, is pushing ahead with aggressive expansion plans in the Netherlands.

Continue reading