Four Ways to Mitigate Mobile and Cloud Data Leaks

Your CEO may be paranoid about WikiLeaks, but his mobile device and cloud computing are the real threats to corporate security

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

CIOs push data into the cloud. Employees post ever more personal and professional information on social-networking sites. And as the WikiLeaks organization talks about releasing secret information about Swiss bank accounts—on top of rumors that it may disclose documents from a large bank in the United States—CIOs find themselves reviewing internal policies and answering questions about security from their CEOs.

“Oh yeah, we’ve had a lot of questions,” says Srini Cherukuri, senior director of IT operations at Matson Navigation, a $1.2 billion ocean shipping company. And, he admits, he doesn’t yet have all the answers. The same CEOs who fret about WikiLeaks also expect to do company business on their shiny new personal smartphones and tablets. That’s a bigger threat, Cherukuri says.

Frank Modruson, CIO at Accenture, agrees. No technology or policy can reliably prevent a leaker from leaking, he says. “WikiLeaks is more of an HR and legal issue than a technology one. Somebody who was trusted shared information he wasn’t supposed to.”

To continue reading this article register now

Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.