Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[November 08, 2024, 04:31:03 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno News
 Peer to Peer Networks Pose Growing Threat to Businesses
Pages: [1]   Go Down
  Print  
Author Topic: Peer to Peer Networks Pose Growing Threat to Businesses  (Read 1048 times)
RealWire
TWI Hero
**********



Karma: 0
Offline Offline

Posts: 18530


View Profile Email
Peer to Peer Networks Pose Growing Threat to Businesses
« Posted: September 18, 2008, 08:18:54 PM »


The growing popularity of peer to peer networks – such as Napster – where people share and exchange music pose a growing threat to confidential data integrity within companies, according to leading IT compliance specialist, Themis Software.

The possible threat of peer to peer networks is growing because of the increasing move to flexible and remote working, where home and work life is merging.  Without corporate firewalls, home workers can inadvertently disclose confidential corporate data from their laptops in peer to peer file sharing networks.  This was highlighted by the recent case in the US where an employee of Citigroup’s ABN Amro Mortgage Group accidentally leaked thousands of mortgage holders’ names and security numbers on a popular peer to peer file sharing music web site. 

The issues around Sarbannes Oxley (SOX) compliance also makes this an urgent issue for all organisations to address.  “SOX compliance means that auditors are spending more time assessing how confidential and privileged information flows around an organisation.  This means that data integrity could be undermined because employees use peer to peer file sharing sites without realising the implications for data integrity which, in turn, could lead to SOX violation,” according to Sean Kane, Managing Director of Themis Software.

The best approach is simply one of education and setting down proper technology usage rules.  “Employees often use file sharing sites without fully realising the dangers that these pose to confidential corporate data.  Companies need to train their staff to understand the possible dangers of peer to peer networks, enforce good content management practices and utilise effective IT compliance technology that blocks and prevents employees from accessing these types of services.”

By offering a single, integrated approach to managing an ever more complex range of IT devices – whether servers, PCs, laptops, PDA’s or USB’s –  IT compliance technology enables firms to keep track of their entire IT inventory, manage and set user standards to IT usage and quickly identify possible security threats.  This offers a simple, very cost-effective approach to centrally tracking its disparate IT asset base and to meet increasingly complex corporate compliance and governance rules.

IT compliance systems not only monitor all IT devices, but also user activity across an organisation’s entire network, identifies and manages all sources of data and pinpoints all data entry and exit paths across an entire estate.  This includes identifying all hidden files and applications, even if deliberately deleted by the user.  A state of the art IT compliance system – such as Themis SIM - manages both IT devices and user activity across the enterprise.

Themis Software is based at: 32 Bloomsbury Street, London, WC1B 6QJ. Tel: 0207 299 4208. Email: [email protected].  Web: www.themissoftware.com

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.226 seconds with 23 queries.