Four Ways to Mitigate Mobile and Cloud Data Leaks

CIOs push data into the cloud. Employees post ever more personal and professional information on social-networking sites. And as the WikiLeaks organization talks about releasing secret information about Swiss bank accounts-on top of rumors that it may disclose documents from a large bank in the United States-CIOs find themselves reviewing internal policies and answering questions about security from their CEOs.

"Oh yeah, we've had a lot of questions," says Srini Cherukuri, senior director of IT operations at Matson Navigation, a $1.2 billion ocean shipping company. And, he admits, he doesn't yet have all the answers. The same CEOs who fret about WikiLeaks also expect to do company business on their shiny new personal smartphones and tablets. That's a bigger threat, Cherukuri says.

Frank Modruson, CIO at Accenture, agrees. No technology or policy can reliably prevent a leaker from leaking, he says. "WikiLeaks is more of an HR and legal issue than a technology one. Somebody who was trusted shared information he wasn't supposed to."

To continue reading, register here and become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags iPadcloud computingmobilesmartphonesinternetwikileakstelecommunicationPhonesaccenturehardware systemsconsumer electronicstablet PCslaptopsTechnology TopicsTechnology Topics | Cloud Computingfreemium

More about Accenture Australia

Show Comments
[]