By Matt Goulet, VP of Sales and Marketing at Globalscape

Chief Information Officers (CIOs) are coming under growing pressure in today’s rapidly evolving, on-demand technology environment. According to a recent study, the number of sensitive records leaked in 2014 amounted to close to one billion, up by 200 million from 2013.

Now, more than ever before, organisations need a safe, reliable way to manage their data exchange activities without fear of a breach or leak. And hopefully, keep their IT managers happy by minimizing the crisis situations that could arise from a data breach or leak.

However, ensuring the safety of an organisations’ data is no longer just the responsibility of the IT department. It is next to impossible for one singular department to be able to track, manage and maintain proper flow of information without the right tools and processes in place. Members of the C-suite should consider investing time into find the right technology for the volume and variety of data each organisation contains, manages, shares and collects. In my view, the answer lies in three words: automation, visibility and functionality.


Automating secure information exchange functions is a very simple way to reduce threats, but in simple terms, it removes the opportunity for human error. One automated system we are seeing our customers implement into email, for example, is automatic encryption. This particular technology allows organisations to share documents and data over email while keeping the files within a company’s secure protected system.

Making these business operations automatic, so that an employee can seamlessly share a file and keep it safe, is a very simple way to keep IT managers happy. It also greatly reduces risk and ensures sensitive information is not simply sent openly over the Internet.


The moment data leaves an organisation’s IT system, its location (and safety) can be very difficult to track until it reaches its destination. Equally, if IT systems are particularly complex and disparate, being able to track individual files can be even more complicated.

Achieving full visibility of a business network can take time, but being able to see the exact location of data, the files coming and going, as well as who they’re from and going to will increase safety. From an IT management perspective, teams can see exactly how employees are implementing safe information exchange practices and understand how to make the lives of staff easier yet continue to increase security.


Often with business operations and new tech products, encouraging staff buy in can be one of the biggest challenges to long-term adoption. No matter how much safer new technology is, if other quicker and/or easier options exist, it can be incredibly difficult to keep staff motivated to use newer, safer alternatives.

Our customers tell us functionality and security are both key considerations when they’re looking for information sharing or collaboration solutions. Companies without functional means to make day-to-day activity secure are likely to see greater numbers of security breaches as a result of employees taking largely unnecessary (and unknowing) risks in order to save time.

The unpredictable nature of breaches makes providing IT departments and employees alike with the best functional, visible and automatic tools available will significantly decrease risk. The latest technology makes securing an organisation from attack while also getting their job done more effective. Knowing who has control of your data and where the data is should be the minimum requirement for a more secure environment. Automation, visibility and functionality can go a long way to helping to combat risk…and ultimately in keeping your CIO a very happy camper.