When hard work backfires

Share this story:Twitter0LinkedIn0Google+0Facebook0

When interviewing job candidates, I’m always on the lookout for dedicated, motivated, passionate people that relish in rolling up their sleeves and doing whatever it takes to get the job done.  Why?  Because a little bit of chutzpah goes a long way towards being a successful and productive employee.

But can employees “going above and beyond” backfire and result in severe damage to a company?

Unfortunately, yes, they can.

In his guest blog post on LastWatchdog, Gary Shottes, President of Ipswitch File Transfer, describes an example of how hard-working employees are causing new security and legal liability implications that organizations need to carefully consider when deciding what tools to provide people with.

“Highly-motivated workers are willing to do whatever it takes to get the job done, with or without IT.  Employees, whose job requires them to send information to colleagues, partners, vendors or customers around the globe, have literally thousands of file transfer options.

If IT fails to provide employees with a fast and easy way to share information, they will take matters into their own hands, even if that means using technology that’s not sanctioned by IT. They may use a personal webmail account, smartphones, USB drive, or even transfer data via Facebook and LinkedIn.”

Combining that increasingly familiar scenario with some recent survey data indicating that over 80% of IT executives lack visibility into files moving both internally and externally drives home the scary point that there’s a big security hole in many companies…. And organizations need to be careful that employees can’t crawl through it, even if it’s with the best of intentions.

Fortunately, there are some great tools out there to arm employees with a quick, easy-to-use and secure way to share information with other people, both inside and outside the company — While at the same time provide the company with the critical visibility, management and enforcement it needs to protect sensitive and confidential information.  This is one situation where it makes a lot of sense to lead the horse to water & make it drink.

This entry was posted in Compliance, Enforcement, Interactions, Ipswitch, Managed File Transfer, Management, Person-to-Person, Security, Visibility and tagged , , , , , . Bookmark the permalink. Post a comment or leave a trackback: Trackback URL.

Leave a Reply