Microage-Kingston-work-from-home-cloud-services-scaled

The Dangers of Dropbox

The Dangers of Dropbox & other file sync apps

work-from-home-file-sync-apps

When employees work from home, they need access to important company files.  It’s easy to look at consumer-grade, cloud file sharing solutions like Dropbox, OneDrive, and Google Drive.  But listen up!  

These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom.  Furthermore, over 7 MILLION Dropbox accounts have been hacked, giving cybercriminals a path into the company’s network. 

This is even MORE important if your company has access to and/or stores financial, medical, or other sensitive data.  Using file-sharing applications like these are a clear and direct violation of data breach and compliance laws.  DON’T USE THEM FOR COMPANY DATA and use only company-approved, business-grade file-sharing applications. 

Now that you know the dangers of dropbox, you can take the necessary precautions while working from home.

Want more tips for setting up safe Work From Home networks? Check out our free report. Or book a free 15 minute work from home security consultation. 

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

The 4 Riskiest US Airports in Which to Use Free Wi-Fi

Using free Wi-Fi at airports is convenient but potentially dangerous. Find out which airports are the most risky and learn how to mitigate the risks.

Read More
on-site backup cloud backup

Pros and Cons On-site Backup and Cloud Backup

Every organization has crucial data that it cannot afford to lose. As more information passes through cloud business networks and data center environments, data security…

Read More

Rethinking Your IT With A Decentralized Workforce – Chapter 3: Cloud Infrastructure

Within an increasingly decentralized workforce, you must know about alternative ways to store and share data. Below are some of the basic elements of cloud…

Read More
Cybersecurity strategies banner, stratégie cybersécurité

Top 5 Cybersecurity Strategies for Your Business

Whether it’s our personal identity, our banking, or possessions in our home, security is a topic we all think about every day. But are you…

Read More

Three essential rules for all cloud applications

The security of your network is most often breached by user error. Protect your cloud application information so you can protect your business. Read more here!

Read More