Businesses organizations are used to dealing with complexities related to core competencies. Handling complexities that arise from the influx of IT solutions on the market, both free and paid, is another issue completely. IT administrators are now in the position of needing to sort out the various collaboration applications and file-sharing products that are widely available via the World Wide Web.
What makes the job even more challenging is the fact that many employees are now choosing to take a ‘Lone Ranger’ approach to the issue, branching out on their own to make use of free applications such as Dropbox, YouSendIt, and Box. All of these web-based applications allow workers to send and share large documents with one another as well as transfer files from one system to another so that remote work is more feasible.
All of them have good points, but for employees to use them without adequate controls and oversight can lead to unforeseen and undesired consequences. AMAG, a pharmaceuticals firm based in Massachusetts experienced this issue firsthand. "A few years ago we were trying to get our first drug out to market, and files were being sent all over the place,” explains executive director Nate McBride “I noticed right off the bat that people were using inventive ways to send confidential files without any way to audit them. We had no way of knowing if they got hijacked along the way.”
Businesses that wish to develop and implement clear policies, along with the security controls to enforce them, should consider working with an experienced IT consulting firm to help them along the way.