📺 Stream EntrepreneurTV for Free 📺

Data in Motion is Data at Greatest Risk Companies grappling with the relentless threat of cyberattacks have to secure the vast amounts of their data moving around with their employees.

By Ken Allen Edited by Dan Bova

entrepreneur daily

Opinions expressed by Entrepreneur contributors are their own.

The Labor Day Weekend hack that set social media sites ablaze with leaked photos of one of the biggest names in Hollywood once again highlighted the issue of data security for both businesses and individuals.

Whether Apple's famous iCloud was actually hacked or if this was a series of targeted attacks against specific accounts is somewhat interesting but inconsequential to most of us. Security experts can afford to debate the split-hair differences between a security breach and an attack but businesses need to focus on the bigger picture takeaway. They must limit exposure to data leakage and theft.

Related: BYOD Is the Corporate Norm But Data Security Lags Far Behind

Let's begin with a basic premise. All data is at risk of being compromised through both malicious and non-malicious activity. Anyone who doubts this need look no further than Target Corporation, Neiman Marcus, Michaels or the latest high-profile example, Home Depot. Data has value and will always be a target for would-be hackers and adversaries but data is also the lifeblood of most organizations. Accepting some level of risk is part of doing business. Managing that risk by recognizing and shoring up points of vulnerability is the difference between using data as a competitive advantage and being the victim of a catastrophic data loss.

Today's sophisticated and well-funded cyber threats can come from anywhere and attack nearly every part of your network. However, data that is moving from one location to another is at its most vulnerable and carries with it the highest probability for loss.

Data that is safely locked away on premise or at a hosting provider still carries a certain degree of risk, but data that is moving beyond the firewall introduces a whole new set of elements into the equation that can be difficult, if not impossible, to control. A good analogy can be found from an unlikely source, the United States Secret Service. The agency is on record stating that the most dangerous time for the protection detail is when the President is in transit and outside of a controlled environment. The same can be said for your data.

Related: Our Collective Mobile Security Blind Spot

According to the Secret Service, if it were up to them, the President would never leave the confines of the White House. Clearly that is not practical as the job demands constant movement. While it would also be safer to lock your data away in a secure environment, that is also not possible as conducting business requires moving information around in various locations and geographies. So the question becomes, how do you protect your most critical or personal assets while they are in motion?

When transferring information, whether it is business or personal related material, users should always consider the potential pitfalls of the channel they are employing. Simply emailing data files or using free services such as Dropbox can have serious implications long after the information has been transferred. For individuals, simply employing encryption software can eliminate many common security vulnerabilities because even if your data is compromised, it is still protected. Other common-sense solutions include: avoiding unsecured wireless networks, locking devices with passwords and avoiding the social channel over share.

For businesses that are forced to deal with compliance and legal implications, it is a bit more complicated. Many of them are turning to a managed file transfer (MFT) system that enables the reliable and secure transfer of files between business parties. It utilizes secure protocols and easy-to-understand models of exchange allowing administrators to always know where files are with accuracy and extensive reporting capabilities.

Unlike traditional or manual file transfer options, MFT incorporates much higher levels of security, scalability, integration, reporting and other features. Through a more sophisticated and controlled file-transfer solution, organizations can bring order, predictability and security to file movement that improves business performance and reduces risk.

Ensuring that files arrive at the intended destination securely and without incident will never create the level of excitement generated by the news of celebrity hacks. That is a good thing. Avoiding security related headlines is the goal of every organization, as the results of a breach or hack can be devastating from both a financial and reputation perspective. So when it comes to securing critical assets in motion and keeping intellectual property under organizational control, MFT should find its way onto everyone's A-list.

Related: Threat of Data Breaches Creates Lucrative Opportunities in Cybersecurity

Ken Allen

Director of Product Marketing at Ipswitch

 Ken is currently the director of product Marketing for Ipswitch and is responsible for all product messaging, positioning and marketing content around the product portfolio. Prior to joining Ipswitch, Ken was the Director of Product Marketing at Metalogix, one of the largest Microsoft SharePoint ISVs.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Starting a Business

Clinton Sparks Podcast: The Secrets of Entrepreneurship Told by David Meltzer

This podcast is a fun, entertaining and informative show that will teach you how to succeed and achieve your goals with practical advice and actionable steps given through compelling stories and conversations with Clinton and his guests.


McDonald's Introduces a New Dessert Inspired By 'Grandmacore' Trend

McDonald's will launch the "Grandma McFlurry," a limited-time dessert blending syrup, vanilla ice cream and candy pieces, as a tribute to comforting grandmotherly treats — and a nod to a TikTok trend.

Growing a Business

Clinton Sparks Podcast: The Struggles and Fame of Rapper Lil Yachty's Entrepreneurship Journey in Hip-Hop

This podcast is a fun, entertaining and informative show that will teach you how to succeed and achieve your goals with practical advice and actionable steps given through compelling stories and conversations with Clinton and his guests.

Business News

OpenAI's New Deal Sees the ChatGPT Trailblazer Following a Competitor's Lead

OpenAI is treading on Google's AI-training territory following its new deal with Reddit.


Want to Be More Productive? Here's How Google Executives Structure Their Schedules

These five tactics from inside Google will help you focus and protect your time.

Side Hustle

These Coworkers-Turned-Friends Started a Side Hustle on Amazon — Now It's a 'Full Hustle' Earning Over $20 Million a Year: 'Jump in With Both Feet'

Achal Patel and Russell Gong met at a large consulting firm and "bonded over a shared vision to create a mission-led company."