Web 2.0 users open a Pandora’s box of security problems
When she can’t find the financial information she needs in the system, the vice president asks her assistant to export the raw data from the financials database into a text file and email it to her at a remote meeting. She receives the file, imports the proprietary data into a spreadsheet, massages the numbers and shares the document online with another assistant, who polishes the final product. The presentation is a success, but the process didn’t involve Microsoft Office, SharePoint or other IT-approved enterprise-class collaborative tools.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.