<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区

          Apps and work: data put at risk

          Updated: 2013-04-07 07:44

          By Quentin Hardy(The New York Times)

            Print Mail Large Medium  Small

           Apps and work: data put at risk

          Rajiv Gupta, chief executive of Skyhigh Networks, right, with engineers at the company's Cupertino, California, headquarters. Peter Dasilva for The New York Times

          Apps and work: data put at risk

          SAN FRANCISCO - As is the case with many busy people, Delyn Simons's life has become an open phone app of commingled corporate and personal information.

          "I've got Dropbox, Box, YouSendIt, Teambox, Google Drive," says Ms. Simons, a 42-year-old executive, naming some of the services on her iPhone that store memos, spreadsheets, customer information and soccer schedules.

          She and her colleagues at Mashery, a 170-employee company that helps other companies build more apps, also share corporate data on GroupMe, Evernote, Skype and Google Hangouts. "From the standpoint of corporate I.T.," she says, "my team is a problem."

          While the company's most confidential information is encrypted and available only to authorized executives, John Oberon, Mashery's information technology chief, who is supposed to keep track of company data, said "there's only so much you can do to stop people from forwarding an e-mail or storing a document off a phone."

          Once the data leaves the corporate network, protecting it becomes much harder. Searching for the name of almost any large company, plus the word "confidential," yields supposedly secret documents that someone has taken from the company network and published.

          Netflix, the streaming video service, recently found employees using 496 smartphone apps, primarily for data storage, communications and collaboration. Cisco Systems, which powers much of the Internet with computer networking gear, found several hundred apps, as well as services for shopping and personal scheduling, touching its own network via employees.

          "People are going to bring their own devices, their own data, their own software applications, even their own work groups," drawing off friends and contractors at other companies, said Bill Burns, the director of information technology infrastructure at Netflix. "If you try and implant software that limits an employee's capabilities, you're adding a layer of complexity."

          Almost no service is invulnerable. In 2011, Chinese hackers obtained access to hundreds of United States government accounts on Google's Gmail. Last July, Dropbox, one of the most widely used storage services, reported a loss of data from a large number of customers. Without special instructions, customer sales information in the online service of Salesforce.com can be moved to private accounts at Box. Evernote recently said user names, e-mail address and passwords had been stolen in an attack, requiring the passwords of more than 50 million accounts to be reset.

          In 2011, Juniper Networks found more than 28,000 samples of mobile malware, mostly for capturing and transferring information like passwords. In January this year, Florida's Juvenile Justice Department reported that 114,538 youth and employee records had disappeared when a storage device with no password was stolen. The state will pay for a year of credit monitoring for everyone whose data was lost.

          Last September, a customer notified Rite Aid that he could obtain other customers' names, addresses and prescription records from the company's mobile app. (Rite Aid says the problem has been fixed and that it is not aware of any data loss.)

          Even without proof of compromised accounts, such losses can cost a company both money and reputation.

          Some apps onto which employees may move company information, like Facebook, are well known. Others, like Remember the Milk, used for completing tasks, are news even to some of the experts in I.T. Skyhigh Networks, which recently started monitoring personal use of apps, has counted more than 1,200 services used in corporate networks from personal devices.

          Skyhigh signs up for each service, along with 1,000 others that have not yet touched a corporate network, and researches them for security issues, like how easy it is to get inside the system and obtain another customer's data. The company then tunes a customer's corporate network to allow services to have different degrees of access to information.

          "We have to be careful how we inspect for security vulnerabilities, since we don't want to get arrested ourselves," says Rajiv Gupta, Skyhigh's chief executive.

          The problem of data leakage is as old as someone taking a carbon copy home on the weekend. What is different now is how people can take data with a finger swipe, and how little they know about whether a service has malware.

          Companies do not want to stand in the way of "life splicing," as the intermingling of home and work tasks is known, because it mostly plays in a company's favor. They just want more security.

          The New York Times

          (China Daily 04/07/2013 page10)

          主站蜘蛛池模板: 欧美人成在线播放网站免费| 亚洲人午夜精品射精日韩| 在线天堂中文新版www| 黄色av免费在线上看| 亚洲国产区男人本色vr| 久久av色欲av久久蜜桃网| 精品国产成人国产在线视| 国内精品视频一区二区三区| 色欧美片视频在线观看| 亚洲一区中文字幕在线| 人妻少妇久久中文字幕| 黄又色又污又爽又高潮 | 国产一区二区三区黄色大片| 国产成人午夜福利在线播放| 国内精品亚洲成av人片| 国产精品自偷一区在线观看| 亚韩精品中文字幕无码视频 | chinese老太交videos| 韩国青草无码自慰直播专区| 91国产自拍一区二区三区| 中文字幕网红自拍偷拍视频| 丁香婷婷色综合激情五月| 国产精品香港三级国产av| 国产亚洲精品欧洲在线视频| 亚洲精品一区二区18禁| 无码内射中文字幕岛国片| 精品尤物国产尤物在线看| 韩国美女av一区二区三区四区| 老太脱裤让老头玩ⅹxxxx| 久久天天躁狠狠躁夜夜躁| 免费A级毛片樱桃视频| 亚洲高清有码在线观看| 国产精品中文字幕第一页| jizz国产免费观看| 亚洲av永久一区二区| 麻花豆传媒剧国产mv的特点 | 久久综合国产精品一区二区 | 欧美成人www在线观看| 免费国产一级 片内射老| 国产香蕉国产精品偷在线观看| 在线观看亚洲AV日韩A∨|