Have you ever wondered about the value of a single document
or digital asset to your work, your livelihood or even life? Maybe the file
contains a contract or evidence to support a claim, a deed or last will and testament, an insurance
policy, years of research, or a business plan. Perhaps interview notes from anonymous
sources for an investigative article. Is the file worth protecting? Is it worth keeping confidential?
The marvels of technology make nearly every digital action
we take more convenient. Yet, when it comes to security, “easier” can often
mean lazier and an open door for attacks that could threaten your business. The
same level of effort that went into creating your document or digital asset should
also apply to how files are protected when they are stored, accessed and shared. And it’s not only a technical job. Time spent training users, changing behavior or bad habits, managing the process and monitoring compliance can fall on your shoulders.
A few years ago, TechRepublic ran a great article called “Chasing the elusive approval for an IT-security budget.” The piece talked about inherent and residual risks and how IT managers can make a business case to help non-tech management understand associated costs. The article also shed light on: “When is the cost of reducing risk more than the cost of having the risk occur?”
A few years ago, TechRepublic ran a great article called “Chasing the elusive approval for an IT-security budget.” The piece talked about inherent and residual risks and how IT managers can make a business case to help non-tech management understand associated costs. The article also shed light on: “When is the cost of reducing risk more than the cost of having the risk occur?”
That reminds us about how digital risks, consequences
and occurrences apply not only to enterprise IT but also more granularly to files
and to every file creator or collaborator. While tech security is vast and
complex, the answer regarding costs for reducing risk at the file level should
never exceed costs of having the risk occur. Part of the solution is finding a
security-equipped application to protect your files. And some of those costs
equate to seeing how that application can complement work flow and get used regularly.