Posted by Tim Luzadder, TCC Enterprise Infrastructure Director

Back in the day, companies had a primary file server for holding all the important files. That was it. Nice and simple. Administrators knew to back up servers as well as the local home folder on desktops and laptops. There may have been other file servers in remote offices, but it was still obvious where the files were. Today’s storage architecture doesn’t even compare. It’s not an outgrowth; it’s whole new species!

We still have file servers, desktops, and laptops, but now we also have SharePoint hosting file libraries, employees emailing themselves documents so they can work on them at home, and countless memory sticks going through home washers and dryers. That doesn’t even come close to all the alternate solutions employees utilize — mechanisms like tablets, smartphones, Dropbox, Google Drive, OneDrive, S3 buckets, Evernote, and the list goes on. These may all be straightforward, effortless solutions, but the typical consumer version lacks security and controls that companies need to protect themselves from data breaches and spills.

Getting this data sprawl under control starts with establishing corporate policies for data and information governance and the Approved List of technologies permitted for use by staff. Organizations need to implement a variety of tools and solutions that offer similar flexibility and workflow that the staff are accustomed to in a manner that maintains company security objectives. These solutions must be socialized and the staff must be trained. Only then can Administrators block the sites that are not approved and enable other means of blocking rogue technology.

 To learn more about TCC’s IT Managed Services, please visit our website


Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s