Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

What privacy profile do you fit?

Ryan Francis | Jan. 30, 2017
Are you a Reckless Rebel or a Nervous Nellie? Whatever your sharing category, we've got tips to help you do it safely.

Why is that? Sixty-three percent are more concerned about keeping their personal information private today because of the U.S. elections and the new administration; and 52 percent say it’s because of the recent large-scale email hacks (for example Yahoo), Gorodyansky said.

“It seems that people are finally waking up and taking privacy and security into their own hands," he added.

Nuance Communications Vice President Chris Strammiello said when taking steps to protect online privacy, companies shouldn’t overlook documents that transition between paper and digital formats during their life cycle. In particular, those transition points, such as document scanning and printing, can introduce risk that threatens data privacy. Documents from employers, banks, vendors and more can include sensitive information such as Social Security numbers, bank account information and birth dates.

“Safeguard privacy by placing filters within scanning applications to restrict document access. These content filters can search for specific words or character strings like ‘confidential’ or ‘non-disclosure’ once they are transformed to a searchable format during the scanning process. After terms are identified, the software can take any number of actions, including automatically encrypting the file prior to sending, or perhaps quarantine or delete the file altogether,” Strammiello said.

He also stated that often companies make the mistake of attempting to cover up private information, like a Social Security number, by using a drawing markup tool, such as a rectangle with solid fill. “The only secure way to do redaction is with a redaction tool, commonly found in PDF software. These tools don’t just cover up text or images; they replace the selected areas pixel by pixel with redaction fill,” he said.

Printing is a data privacy tactic that is notoriously overlooked, Strammiello said. Due to the non-searchable format of printed documents, they can be difficult to track and dangerous to store. “Plus, consider the human error involved; accidentally taking the wrong document from the printer or maliciously distributing copies outside of an organization can be just as damaging as a hacker or malware. Establishing a robust print and capture log can help with these protection efforts,” he said.

What enterprises need to do

Encouraging employees to use their personal devices for work can increase collaboration and productivity, but BYOD can also weaken security and enterprise data protection. “As the lines between personal and corporate data become blurred, people may resist turning on conventional mobile device management to protect their personal privacy and information from their company,” said Manoj Raisinghani, vice president for Mobility Platforms at Citrix.

With employee owned smartphones and tablets used in the enterprise projected to exceed 1 billion by 2018, IT departments need to provide employees with mobile security that creates a barrier between personal and corporate information and apps to make sure people trust and embrace mobile security. This ability to separate personal and corporate information is a key advantage of integrated enterprise mobility management solutions, and a critical requirement to persuade employees to embrace mobile security.


Previous Page  1  2  3  4  5  Next Page 

Sign up for CIO Asia eNewsletters.