SlideShare a Scribd company logo
1 of 11
7 Risks Dropbox
Poses to Your
Corporate Data
Introduction
*All marketing claims refer to Dropbox Basic version 3.0.3 as of December 9, 2014
“We live in a world where information equals power. With the influx of
online file-sharing solutions, distributing information has become easier
than ever. As a result, it is now easier for information to fall into the
wrong hands intentionally or unintentionally.”
-Enterprise file sync-and-share, Terri McClure, Kristine Kao, TechTarget
—
Bring-your-own-device (BYOD) policies and an increasingly mobile
workforce are putting new pressures on IT and changing the
requirements for how workers want (and need) to access corporate
data.
With over 300 million users, Dropbox has become the predominant
leader for mobile file access. Unfortunately, what works for family
pictures does not work with corporate files. In most cases, Dropbox’s
quick to install, easy-to-use, consumer-grade services present
unacceptable security, legal and business risk in a business
environment.
Here are the 7 Risks Dropbox Poses to Your
Corporate Data.
01
Data theft
Most of the problems with Dropbox emanate
from a lack of oversight. Business owners are
not privy to when an instance of Dropbox is
installed and are unable to control which
employee devices can or cannot sync with a
corporate PC. Use of Dropbox can open the
door to company data being synced (without
approval) across personal devices. The
proliferation of these personal devices, which
accompany employees on public transit, at
coffee shops, and with friends, exponentially
increases the chance of data being stolen or
shared with the wrong parties.
When administrators cannot manage and
monitor file sync activities across an
organization, they risk losing critical data. If an
employee (or group of employees) adopts
Dropbox and starts using it to sync and share
sensitive files, administrators without proper
oversight cannot manage data sprawl, initiate
remote wipes in the case of lost devices, and
are unable to guarantee that files are properly
shared with the right people.
02
Data loss
In a study by CERN, the European Organization
of Nuclear Research, silent data corruption was
observed in 1 out of every 1500 files. Dropbox
and other consumer-grade file sync services
disclose few, if any, details about how they
prevent data corruption from occurring. True
business-grade file sync services
cryptographically tag every piece of data and
redundantly store data on multiple data center
racks to virtually eliminate any chances of silent
data corruption, which has been shown to be
common in large-scale storage systems.
03
Corrupted data
Dropbox gives carte blanche power to
employees over the ability to permanently delete
and share files. This can result in the permanent
loss of critical business documents as well as
the sharing of confidential information, which
can break privacy agreements in place with
clients and third parties.
04
Lawsuits
Many compliance policies require that files be
held for a specific duration and only be
accessed by certain people; in these cases, it is
imperative to employ strict control over how long
files are kept and who can access them. Since
Dropbox has loose (or non-existent) file
retention and file access controls, businesses
that use Dropbox are risking a compliance
violation.
05
Compliance violations
Managers whose employees use Dropbox do
not have access to detailed reports and alerts
over system-level activity. As a result,
administrators don’t have control of or visibility
into how files have been edited, shared, or
deleted. Business-grade, admin-controlled file
sync services allow managers to view a
comprehensive audit trail that details who
touched or modified a file at any given point.
06
Loss of accountability
Dropbox does not track which users and
machines touched a file and at which times.
This can be a big problem if you are trying to
determine the events leading up to a file
creation, modification, or deletion. Moreover, at
a moment’s notice, files and folders may not be
in their proper locations or readily available to
employees.
07
Loss of file access
Conclusion
Dropbox poses many challenges to businesses that care about control and
visibility of company data. Allowing employees to utilize Dropbox can lead to
massive data leaks and security breaches.
While blacklisting Dropbox in the workplace may curtail the security risks in the
short term, employees may ultimately discover loopholes, such as circumventing
company firewalls or adopting another consumer-grade file sync service.
The best way for business to handle this is to deploy a company-approved
application that will allow IT to control the data, yet grants employees the access
and functionality they need to be productive wherever they are. Employees
whose companies provide them with a secure, easy-to-use file sync service will
see no need to bring Dropbox into the workplace.
What should I do to learn more?
Lets start the conversation
Start a Trial Account Today
Or contact us with your questions
Phone: 303.725.1219
Email: info@wagnercommsystems.com

More Related Content

Recently uploaded

Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
mbmh111980
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
Alluxio, Inc.
 

Recently uploaded (20)

how-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdfhow-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdf
 
What need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java DevelopersWhat need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java Developers
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by Design
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
 
Workforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfWorkforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdf
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
 
5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
SQL Injection Introduction and Prevention
SQL Injection Introduction and PreventionSQL Injection Introduction and Prevention
SQL Injection Introduction and Prevention
 
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfMicrosoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
 
CompTIA Security+ (Study Notes) for cs.pdf
CompTIA Security+ (Study Notes) for cs.pdfCompTIA Security+ (Study Notes) for cs.pdf
CompTIA Security+ (Study Notes) for cs.pdf
 
APVP,apvp apvp High quality supplier safe spot transport, 98% purity
APVP,apvp apvp High quality supplier safe spot transport, 98% purityAPVP,apvp apvp High quality supplier safe spot transport, 98% purity
APVP,apvp apvp High quality supplier safe spot transport, 98% purity
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 
IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

7 risks dropbox poses to your corporate data

  • 1. 7 Risks Dropbox Poses to Your Corporate Data
  • 2. Introduction *All marketing claims refer to Dropbox Basic version 3.0.3 as of December 9, 2014 “We live in a world where information equals power. With the influx of online file-sharing solutions, distributing information has become easier than ever. As a result, it is now easier for information to fall into the wrong hands intentionally or unintentionally.” -Enterprise file sync-and-share, Terri McClure, Kristine Kao, TechTarget — Bring-your-own-device (BYOD) policies and an increasingly mobile workforce are putting new pressures on IT and changing the requirements for how workers want (and need) to access corporate data. With over 300 million users, Dropbox has become the predominant leader for mobile file access. Unfortunately, what works for family pictures does not work with corporate files. In most cases, Dropbox’s quick to install, easy-to-use, consumer-grade services present unacceptable security, legal and business risk in a business environment. Here are the 7 Risks Dropbox Poses to Your Corporate Data.
  • 3. 01 Data theft Most of the problems with Dropbox emanate from a lack of oversight. Business owners are not privy to when an instance of Dropbox is installed and are unable to control which employee devices can or cannot sync with a corporate PC. Use of Dropbox can open the door to company data being synced (without approval) across personal devices. The proliferation of these personal devices, which accompany employees on public transit, at coffee shops, and with friends, exponentially increases the chance of data being stolen or shared with the wrong parties.
  • 4. When administrators cannot manage and monitor file sync activities across an organization, they risk losing critical data. If an employee (or group of employees) adopts Dropbox and starts using it to sync and share sensitive files, administrators without proper oversight cannot manage data sprawl, initiate remote wipes in the case of lost devices, and are unable to guarantee that files are properly shared with the right people. 02 Data loss
  • 5. In a study by CERN, the European Organization of Nuclear Research, silent data corruption was observed in 1 out of every 1500 files. Dropbox and other consumer-grade file sync services disclose few, if any, details about how they prevent data corruption from occurring. True business-grade file sync services cryptographically tag every piece of data and redundantly store data on multiple data center racks to virtually eliminate any chances of silent data corruption, which has been shown to be common in large-scale storage systems. 03 Corrupted data
  • 6. Dropbox gives carte blanche power to employees over the ability to permanently delete and share files. This can result in the permanent loss of critical business documents as well as the sharing of confidential information, which can break privacy agreements in place with clients and third parties. 04 Lawsuits
  • 7. Many compliance policies require that files be held for a specific duration and only be accessed by certain people; in these cases, it is imperative to employ strict control over how long files are kept and who can access them. Since Dropbox has loose (or non-existent) file retention and file access controls, businesses that use Dropbox are risking a compliance violation. 05 Compliance violations
  • 8. Managers whose employees use Dropbox do not have access to detailed reports and alerts over system-level activity. As a result, administrators don’t have control of or visibility into how files have been edited, shared, or deleted. Business-grade, admin-controlled file sync services allow managers to view a comprehensive audit trail that details who touched or modified a file at any given point. 06 Loss of accountability
  • 9. Dropbox does not track which users and machines touched a file and at which times. This can be a big problem if you are trying to determine the events leading up to a file creation, modification, or deletion. Moreover, at a moment’s notice, files and folders may not be in their proper locations or readily available to employees. 07 Loss of file access
  • 10. Conclusion Dropbox poses many challenges to businesses that care about control and visibility of company data. Allowing employees to utilize Dropbox can lead to massive data leaks and security breaches. While blacklisting Dropbox in the workplace may curtail the security risks in the short term, employees may ultimately discover loopholes, such as circumventing company firewalls or adopting another consumer-grade file sync service. The best way for business to handle this is to deploy a company-approved application that will allow IT to control the data, yet grants employees the access and functionality they need to be productive wherever they are. Employees whose companies provide them with a secure, easy-to-use file sync service will see no need to bring Dropbox into the workplace.
  • 11. What should I do to learn more? Lets start the conversation Start a Trial Account Today Or contact us with your questions Phone: 303.725.1219 Email: info@wagnercommsystems.com