Modern Data Breach: A Problem of the People and the Process

Category: Blog  | , , , ,

2014 data breaches

Summary of the ten major categories for data breaches in 2014

It’s Wednesday evening. Your work day is coming to a close, but you still have at least an hour or two worth of plugging and chugging left. Perhaps you’re even going to send some files to that client you’re trying to impress. You’re a ‘good’ employee so you decide to take your work home with you and catch an episode of that new hacker show, Mr. Robot. Sure, why not? You’ve done it before. Your company even lets you BYOD for instances just like this one. You transfer files. Fill a manila folder full of papers that are thematically marked ‘confidential’.  You’re all set, nothing left but the commute.

The Crown Jewels have left the castle

Did you notice? Did you realize the major transgression that’s taken place? Of course you didn’t. No one did. Not even your multi-national corporation that spends millions on security in attempt to keep safe the golden goose. How does it feel? Betrayal. In this instance, I imagine it feels like the closing of a subway door or the opening of an apartment elevator. At least you got home safe. Turn on your Keurig, inhale the sweet smells of blissful ignorance. You’ve got more work ahead of you, remember?

Document Management Whitepaper

Lane Severson states in his article We’ve Seen the Face of the Modern Data Breach, And It’s Us that “heroes are the problem” for going above and beyond, bypassing security protocol. I think you’d call it “getting the job done”. Is that what you are? A hero? I guess that makes sense being that heroes have a higher propensity towards becoming monsters.  But you’re not a monster. You’re just trying to earn that long awaited promotion. Unbeknownst to you, Experian reports:

Between human error and malicious insiders, time has shown us the majority of data breaches originate inside company walls. Employees and negligence are the leading cause of security incidents but remain the least reported issue. According to industry research, this represented 59 percent of security incidents in the last year.

Remember that bar graph at the top of this post? That’s you. Somewhere in those four long blue bars. Smile. Take a selfie. I bet you’re not likely to post that on Facebook. You might as well, the damage is done now. It’s all over… Hero.

By now you’re probably looking for answers. Preventative measures so that you and your comrades are no longer victims to a crime that no one knows about. Because let’s face it, you are the hero after all. Aren’t you? Lane Severson weighs in saying:

In reality, business users require a solution with more design and forethought. If the information management experience is designed with a limited number of high level use cases in mind it will provide the twin benefits of engaging end-users and providing common functionality like secure file sharing, digital rights management, etc. which will improve information security.  

Ah, there it is. Software. Good software. A software that promotes a collaborative work environment that can be accessed securely from anywhere. Just like DocStar ECM from DocStar. And for good measure, it can be hosted both on-site and on the cloud. And while the stigma of the cloud leads people to believe it’s less secure due to its public nature, the number 59 steadies its glare upon you from above. How menacing.

It was Fitzgerald that said “show me a hero, and I’ll write you a tragedy”. He was right. But heroes are people who are best in the darkest hour, that’s why they’re heroes. And now that your clock has struck midnight, what will you do?

Find answers with our cloud-based DocStar eclipse demo

So, Hero. You still need more? Read Lane Severson’s full article on data breach at: