Four Ways to Mitigate Mobile and Cloud Data Leaks

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

Your CEO may be paranoid about WikiLeaks, but his mobile device and cloud computing are the real threats to corporate security

CIOs push data into the cloud. Employees post ever more personal and professional information on social-networking sites. And as the WikiLeaks organization talks about releasing secret information about Swiss bank accounts—on top of rumors that it may disclose documents from a large bank in the United States—CIOs find themselves reviewing internal policies and answering questions about security from their CEOs.

“Oh yeah, we’ve had a lot of questions,” says Srini Cherukuri, senior director of IT operations at Matson Navigation, a $1.2 billion ocean shipping company. And, he admits, he doesn’t yet have all the answers. The same CEOs who fret about WikiLeaks also expect to do company business on their shiny new personal smartphones and tablets. That’s a bigger threat, Cherukuri says.

Frank Modruson, CIO at Accenture, agrees. No technology or policy can reliably prevent a leaker from leaking, he says. “WikiLeaks is more of an HR and legal issue than a technology one. Somebody who was trusted shared information he wasn’t supposed to.”

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Insider Resume Makeover: How (and When) to Break the Rules
Join the discussion
Be the first to comment on this article. Our Commenting Policies