Experts in security have been warning for years against the hazards of peer-to-peer{P2P} sharing by corporations. The practice of p2p sharing can create security holes allowing malware onto networks and giving access to your sensitive data.
The P2P community may at last be heeding the warnings; next week a company representing P2P file sharing providers will publish a report that purportedly finds P2P software companies are modifying their programs in an effort to make it harder for users to inadvertently share sensitive information.
The problem in corporate America, experts say, is that employees are violating corporate policy by using P2P software at work or on work laptops to download MP3 files, or they take the work laptop home and their children install file-sharing software on it. "Ninety-three percent of P2P disclosures in the enterprise are inadvertent," said Tiversa Brand Director Scott Harrer. "You can't really guard against human error."
The latest version of popular file sharing software, released earlier this year, LimeWire 5, includes a number of the suggested security changes and served as a "poster child for compliance," said Marty Lafferty, chief executive of the DCIA.
It's not just corporations that should fear P2P sharing; home users need to be concerned as well. According to the Identity Theft Assistance Center, throughout this year "criminals will continue to exploit new technologies to commit identity theft." At the top of their list of 'major event' security breaches from 2007 is a case involving a P2P file sharing network.
Even with the public becoming more educated on P2P sharing, the use is steadily on the rise. A large number of people use file sharing to download music, movies and games. What they don't know is doing so can allow access to their personal information, such as business, tax and personal files.
The danger here is clear, as it is commonly acknowledged that criminals now troll file sharing networks for the sole purpose of finding sensitive data that can be used to commit identity theft.One of the steps you can take to protect your files is looking into software like Identity Finder.Identity Finder has the ability to automatically search for personal information inside files, e-mails, and web browsers. It then helps individuals securely delete the data or protect the information with encryption.
The best thing that corporations and the public can do is become educated in P2P sharing and the dangers that exists. For more information on P2P sharing click here.
Wednesday, March 18, 2009
Subscribe to:
Post Comments (Atom)
Popular Posts
-
When it comes to computers, most people expect theirs to be outdated within four years or less, depending on how you treat it. When Jonathan...
-
Samsung has just displayed a new processor at the International Solid-State Circuits Conference. The new Exynos chip will be available in du...
-
Windows 8 will be coming soon (we hope) and the tech world is in a frenzy. Windows 7 was one of the best operating systems released by Micro...
-
It would seem that the arms race between AMD and Intel has ended, and the victor is Intel. The most recent news to come out of AMD’s headqua...
-
If you are one of Hewlett-Packard's Elite PC customers, then I have some good news for you. The company recently announced that it has o...
-
Last Monday internet provider Clearwire announced that it would begin offering a pay-as-you-go 4G service for its customers. With the demand...
-
There is a recently released list of the Top 500 most powerful computers in the world, and once again Japan's K Computer takes the numbe...
-
Google Chrome was just updated and the newest version brings an option to print any webpage using Cloud Print and multiple profile support f...
-
Considering operations are disrupted at over a dozen hard disk drive (HDD) factories thanks to flooding in Thailand, PC manufacturers should...
-
Intel has just announced their newest product, the Intel SSD 320 Series, which represents a significant upgrade to Intel's existing line...
No comments:
Post a Comment