Five Ways to Ensure Remote Workers Are Sharing and Accessing Files Securely

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click for five ways businesses can implement and support a secure remote work force, as identified by James Bindseil, president and CEO of GlobalSCAPE, Inc.

Security is a hot button issue for businesses of all sizes and across every industry. IT administrators are attempting to plug leaks, update systems, and plan ahead for new threats – hackers, viruses, and even the NSA make the short list of priorities. Unfortunately, this often leads IT to overlook possible threats posed by internal forces, especially those caused by accidental incidents, particularly related to securing and sharing data outside the business' network.

The number of remote workers in the U.S. increased by more than 80 percent from 2005 to 2012, and it's predicted that the number of telecommuters will increase to 3.9 million by 2016, a 21 percent jump from the current level, according to Global Workplace Analytics. A second study by Globalscape found that more than 60 percent of employees knowingly take home confidential data, storing it on insecure devices and accounts – 75 percent believing IT approves of their behavior.

The increase in organizations encouraging or offering telecommuting programs demonstrates a strong, immediate need for secure remote access and file-sharing strategies for the enterprise. Here are five ways businesses can implement and support a secure remote work force, as identified by James Bindseil, president and CEO of GlobalSCAPE, Inc.

 

Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

 
More Slideshows

Wearables1-190x128.jpg Five Ways Smartwatches Will Change E-Commerce

Smartwatches will change e-commerce as we know it, whether it's through altering the face of consumer data, miniaturizing the act of consumer engagement, or changing the way we pay for things. ...  More >>

EMCSyncplicityEnterpriseAppsUX0x Preventing Shadow IT: Tips for Designing Better Enterprise Apps

If users are dissatisfied with their UX, they often will migrate to less secure "shadow IT" service, which puts an entire company at risk of security incidents. ...  More >>

Global5-190x128.jpg Developing Tech: What's Next?

Consumers will start to require more utility from tech, and the enterprises behind the scenes will be forced to rise to those expectations. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date