I was shocked, but then again not really surprised, when I read the news this morning: ‘NSA taps in to internet giants’ systems to mine user data, secret files reveal. Top secret PRISM program claims direct access to servers of firms including Google, Facebook and Apple. Companies deny any knowledge of program in operation since 2007′. Here’s a link to the article.

This so called program allow NSA to look at your private information at their convenience. It gives them ‘direct access from the servers of these US service providers: Microsoft, Yahoo, Google, Facebook, Paltalk, AOL, Skype, YouTube, Apple’.

And do you know who is next in line? DROPBOX!

If you really value your company privacy, intellectual property and documents, get off Dropbox now!

But why you may ask? You do not allow your employees to use Dropbox. It is against corporate policies. Well, your employees are probably using Dropbox right now because it is fundamentally a great idea. Easy access to your documents from any device. This, in one way, is beneficial to your organization, but in another way very bad. You simply have no control of your data. I could go on and on about the perils of using cloud based file sharing solutions but I think you got my point. Especially after reading today’s news!

And if this is not enough why don’t you go ahead and read the Dropbox security overview:

‘We guard your privacy to the best of our ability and work hard to protect your information from unauthorized access. Dropbox employees are prohibited from viewing the content of files you store in your Dropbox account, and are only permitted to view file metadata (e.g., file names and locations). Like most online services, we have a small number of employees who must be able to access user data for the reasons stated in our privacy policy (e.g., when legally required to do so). But that’s the rare exception, not the rule. We have strict policy and technical access controls that prohibit employee access except in these rare circumstances. In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.’

And yes, I will go on anyway, please also read their terms of use:

‘Your Responsibilities

Files and other content in the Services may be protected by intellectual property rights of others. Please do not copy, upload, download, or share files unless you have the right to do so. You, not Dropbox, will be fully responsible and liable for what you copy, share, upload, download or otherwise use while using the Services. You must not upload spyware or any other malicious software to the Service.

You, and not Dropbox, are responsible for maintaining and protecting all of your stuff. Dropbox will not be liable for any loss or corruption of your stuff, or for any costs or expenses associated with backing up or restoring any of your stuff.’

Did you know that your corporate data is not stored on Dropbox? It’s stored on Amazon. So make sure you are 100% up to date with their security policies too!

Dropbox summaryBut how do I know if my employees are using Dropbox to store corporate data? RES Software’s trusted partners can help you analyze Dropbox usage within your organization. It will give you an overview of who is using Dropbox, what type of information is stored and how much storage is used.

When this has been done, you can then migrate all corporate data from Dropbox to RES HyperDrive and prohibit future access to Dropbox.

RES HyperDrive is a service similar to Dropbox but it is hosted in your own data center with your own security policies and your own regulations. Corporate data is secure by the means of encryption; both in the data center and on the devices that your employees are using. You have the possibility to remotely wipe data if a device is lost or stolen. Read more here on how RES HyperDrive can help you get back in control of your data.

If you really value your corporate data, intellectual property and privacy, GET OFF DROPBOX NOW before NSA is looking at it! And honestly, anyone can be looking at it right now…