Starting June 24, you may notice restrictions for risky sites, such as file converters, photo sharing, or personal sites and blogs. Several key considerations drive the decision to restrict access to certain websites on company-managed networks, including:
- Data Security and Confidentiality: Using file converters, photo sharing, or personal sites and blogs web applications can pose confidentiality risks due to potential vulnerabilities in handling sensitive information, inadequate encryption measures, and the risk of unauthorized access or data breaches.
- Data Exposure and Leakage: Using file converters, photo sharing, or personal sites and blogs web applications can pose data exposure risks to unauthorized parties or data leakage to the company due to potential mishandling of sensitive information during file conversion, sharing of confidential images, or inadvertent disclosure of personal or corporate data on public platforms.
- Compliance and Legal Obligations: Using a file converter or photo-sharing web application can pose compliance and legal risks due to the potential for copyright infringement, unauthorized distribution of sensitive information, and liability for user-generated content. Additionally, agreements with these platforms may lack clarity on data ownership and usage rights, complicating compliance efforts and exposing the company to legal liabilities for mishandling sensitive information.
Cybersecurity is not just a task for IT teams. Every employee plays a vital part. Reporting suspicious emails, double-checking the identity of callers, and adhering to security protocols are essential actions everyone can take. If you have questions, contact infosec@republicservices.com or access the Cybersecurity SharePoint site to learn more.