Murph's Blog: Connecting the World and Improving Productivity but Do You Know Who Really Has Access to Your Content.

Murph's Blog: Connecting the World and Improving Productivity but Do You Know Who Really Has Access to Your Content.

By Steven Murphy | January 28, 2015

Last week I returned from Davos, Switzerland and the World Economic Forum (WEF) where the explosion of the internet and data sharing in the cloud for expanding education, collaboration and social media were highlighted as keys to improving work force productivity, lowering the financial bar to help developing nations enter the modern economy and improving the voice of democratic people.

As passionately as these investments in developing countries were heralded, the topic quickly pivoted to recent headlines regarding content breaches- and how can we Trust the Technology and how to defend against security threats and civil liberty breaches from bad actors outside their networks but more importantly inside their organization.

This years' DAVOS WEF conversation allowed me to a chance to speak about “Secure Content Mobility' and the exponential rise in insider security threats and what world and business leaders should do to secure their content while increasing productivity.

I had a chance to catch up with Yahoo’s focused CEO Marissa Mayer after her talk on 'In Technology We Trust' and was able to share my view on the state of content collaboration and internal threat security and its relevance in my talking points about “Secure Content Mobility.'

I am passionate about this paradox because insider threats not only damage companies and their balance sheets and reputations in the marketplace, but if ignored the threats to personal information of clients, patients, customers, citizens, business leaders, elected leaders and military personnel. These breaches decrease the productivity and freedom of speech that is at the heart of the new digital economy.

The vast majority of workers with access to critical data will never breach or use that access to expose their organization. But with the rise of content collaboration in the cloud, one bad actor’s data leak could quickly change the global standing of a company or state.

Verizon’s 2014 Data Breach Investigation found that 88% of insider threat actions came from privileged abuse. Not a hacker. Not an enemy state. A user in their network abusing their privilege. It’s a growing balancing act for IT professionals who need to increase productivity while also limiting the potential for insider threat. Reducing insider threats isn’t done with a new firewall or anti-virus patch, it’s done through process and knowledge used to manage, monitor and analyze how people are using their access on their organization’s networks and Serious Management Tools to re-enforce your privacy strategy.

I had some great conversations on this topic with fellow attendees who understood the growing insider threat issue and are working to eradicate such threats with former UK Prime Minister Tony Blair; Blackstone Chairman, CEO and Co-Founder Stephen A. Schwarzman; JP Morgan Chase CEO Jamie Dimon; and Fox Business’ Maria Bartiromo. See the pics below...

Insider Security Threats have been a growing problem for years now for private companies, now global leaders aren’t only listening – they’re looking for ways and tools to defend against them.


Written By: Steven Murphy

Leave a Comment

Add new comment