Commercial Investment Real Estate May/June 2016 | Page 22

tECHnoloGy solutions Risky Business by Mika Javanainen information Management Enforcement 1 File sharing impact Collaborating on content with customers, partners, and outside consultants and agencies is a routine part of the commercial real estate business. However, doing so without guidance or limitation can jeopardize sensitive information and put a company’s reputation at risk. this interactive business depends on the successful collaboration between investors, asset and property managers, building engineers, and tenants, as well as a trusted network of developers, mortgage lenders, and appraisers. While fle-sharing technologies streamline the fow of information and boost organizational productivity, the risk is the loss of confdential information and intellectual property. 2 the frst step to safeguarding company content is to clearly defne guidelines for the use of company-issued and employee-owned devices and applications, connecting with its systems and networks. A formalized information management initiative sets precedent for how employees can use their personal systems at work in a safe, appropriate manner, as well as raising awareness of the potential risks. When employees know the threats and consequences to the company, they are more likely to change their behaviors. Another critical component to successful information management is the ability to identify and track a company’s most sensitive content, enabling organizations to enforce the policies they set. Working in tandem, management and it can identify where their most valuable and confdential information resides and invest in protective technology to control access to it. together, well-promoted policies and an enterprise information management system can protect a company and its data from the external threats posed by employees’ unsanctioned use of consumer fle sharing systems at work.  May | June | 2016 Commercial Investment Real Estate Employees rely on anytime-anywhere data access. As a result, using consumer fle sharing applications at work is extremely prevalent. these apps deliver convenience, making them an easy choice for document access, information sharing, and collaboration. However, drawbacks exist. What is the potential cost to businesses if employees use them in an unauthorized, unregulated manner? According to recent analysis by Gartner, an information technology research company, employees gravitate toward consumer online fle sharing tools for two reasons: • frst, they are easy and intuitive to use, and • second, these tools enable employees be more productive across networks, devices, and operating systems. A recent M-Files survey revealed that nearly half of surveyed professionals have stored confdential company information on their personal fle sharing and sync solutions. Additionally, 70 percent of respondents say their organizations either lack corporate policies for using fle sharing apps or haven’t shared their policies. the survey shows the alarming unintended consequences of lax corporate security policies. About 25 percent of respondents reported their company has experienced information security breaches, data loss, noncompliance violations, or other problems stemming from employees’ use of personal fle sharing and sync solutions at work. similar independent studies mirror this survey’s results, confrming employees’ overwhelming use of external fle sharing systems. these practices occur whether or not company policies prohibit them. such rogue practices should cause corporate concern. Employee reliance on personal fle sharing apps can result in serious data security breaches and compromised compliance processes.