Welcome!

Cloud Security Authors: Zakia Bouachraoui, Yeshim Deniz, Terry Ray, Liz McMillan, Pat Romanski

Related Topics: @CloudExpo, Cloud Security, @DXWorldExpo

@CloudExpo: Blog Post

Bootlegging, Piracy and Document Management Have Things in Common By @IanKhanLive | @CloudExpo #Cloud

Based on industry statistics, today over 81% of organizations are still using methods that put their organization at risk

No seriously, I mean it. There are serious correlations and similarities between smuggling alcohol and piracy in any form, whether it's the real life bad guys on ghost ships in the seas or digital pirates who download stuff off the internet thinking it's all free stuff while some artist starves to death, or for that matter an enterprise user; quite specifically a certain type of enterprise user. The ones that love free applications and start using them, well and not just use them but spread it to the entire department. You probably have a Bob or Sally or Travis in your department who sends you an innocent link to Dropbox or Google Drive with the Excel file that was too big to send through email. How about that file from accounting that is conveniently shared on Google drive that can be accessed by everyone, including the CFO from his home? Convenient right? Well yes, convenient but also an early preparation to being sued by your customers or probably tens of other people as well. I am really not trying to scare you off but I know this drum has been beaten too many times. Only 19% of organizations have adopted something that does not put their business at risk doing something almost illegal.

Based on industry statistics, today over 81% of organizations are still using methods that put their organization at risk. Ninety-five percent of employees share documents by email. Forty-two percent employees use consumer grade document sharing applications with Dropbox taking the first spot, followed by Google Drive & Apple iCloud, and last but not least Microsoft SkyDrive.

Man in the Cloud (MITC) attacks are now common. Essentially your free cloud service like a Box.net, Google Drive or Microsoft Sky drive is being hacked into based on a token that was generated through the service when you first connected to it. Remember, as we are becoming more intelligent, so are hackers and cyber criminals. It's also public information that Google drive, as an example, had a huge security flaw that enabled the bad guys to hack into your account with a public URL link. Here is an interesting blog post that gathered the thoughts of 34 technology experts and their views on document management and sharing.

Going back to bootlegging and privacy, here is the truth of the matter. It's about the journey; the journey that all of them take to reach their destination, the sacrifices and the tradeoffs that are made during this journey. Consider bootleggers, essentially people who smuggle alcohol. They have drivers to do so, a tradeoff, an end result. They also have risks they undertake, some knowingly and some unknowingly. Their needs, drivers, end results and risk are the same as that of pirates and ultimately a typical enterprise user who values free document sharing applications. They all want to be somewhere; they all have to do something. How about the fact that in the process of going somewhere and reaching their destination, they end up destroying something, something very valuable. How about the intellectual property rights of artists, musicians, creative people who spend a lifetime perfecting their skills, just to be downloaded without their consent and without any monetary compensation? Mass stealing could not get any worse. In fact piracy is considered to be a crime that an entire generation is committing, not just pirates. Isn't that sad? There is a lot more to tell and I will do that in some of my next posts. Purely because this is a very serious matter.

I am running a free webinar tomorrow (Jan 27), speaking about this exact thing where I will go in depth with all three things that Pirates, Bootleggers and Enterprise Users have in Common. Join me if you have the time!

More Stories By Ian Khan

CNN Futurist, Forbes Contributor, Author, 3 Time TEDx Speaker and Technology Futurist, over the last 20 years Ian Khan has had the privilege to serve the needs of over 5000 organizations by fueling their growth through technology solutions. He has helped a diverse set of businesses ranging from Technology Companies, Oil Companies, Power Generation & Renewables Operators, Microsoft Ecosystem Partners, SAP Customers and Partners, Healthcare Providers, Manufacturers, Facility Operators, Startups, Educational Institutions, Nonprofits & associations and more. Ian’s experiences with these organizations led him to a unique position of being able to identify the common challenges of growth for all these organizations. The bottom line as he found out, is that we all are hungry for success and want to grow and make a difference. Where we fall short is by failing to understand our environment and taking the right action within that environment. After 20 years serving the needs of the industry Ian’s natural pivot was to answer his calling and help organizations at a broader level understand what tomorrow brings. His work and study of all these organizations brought forward very unique perspectives that he now share through his work. Today, hands down, we live in the great time for humanity. Technology is a great thing, but it also has its victims. Many organizations of tomorrow will fail under the pressure of a fast changing world, much of which is fueled and driven by technology. Ian’s mission is to help organizations avoid that pitfall, and propel themselves into success in today’s era and go from digital disruption to digital transformation in the fastest and most sustainable way. This is the only way, according to him, we can together create limitless value, create solutions that are faced by us locally as well as by others around the globe, and make the world a happier place. Today Ian’s work spans working with people by delivering keynotes, consulting and by promoting his 7 –Axioms methodology through his book and workshops. He is also working on an ambitious project of releasing a documentary in spring of 2018 called Industry 4.0. Industry 4.0 will capture the thoughts and insights of some of the world’s leading thinkers and help us understand the 4th Industrial Revolution, Its Impact, and how we can all be have an opportunity to be part of the emerging future and make the right choices. For more information please visit www.iankhan.com

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...