What's Your P2P Policy?

You’re looking at a website right now, but what else is open on the toolbar at the bottom of your screen? Customer spreadsheets? Financial documents? Confidential memos? What’s the risk that a hacker is looking over your virtual shoulder to steal data that could be used to commit fraud or ID theft? The answer may depend on your company’s policy toward peer-to-peer (P2P) file sharing.

P2P technology is a way to share files, play games, and facilitate online phone calls. Because anyone can join a P2P network by installing certain software, multiple computers can be connected at once. But when P2P software isn’t configured properly, files you didn’t mean to share may be accessible to others, including cybercrooks casing the network for easy access to sensitive data.

Some businesses ban the use of P2P programs on company computers. Others allow them – with strict safeguards. But if you’re asked "What’s your company’s policy on P2P file sharing?" the only wrong answer is "We don’t have one."

To help companies manage the risks posed by file sharing software, the FTC has published Peer-to-Peer File Sharing:  A Guide for Business, a plain language handbook written for corporate decision makers.  Download the brochure, order free copies from the FTC, watch this video – and set up a time to talk over the issue with your in-house IT guru.

0 Comments

| Comment Policy

Leave A Comment

Don't use this blog to report fraud or deceptive practices. To file a complaint with the Federal Trade Commission, please use the FTC Complaint Assistant.

PRIVACY ACT STATEMENT: It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act and the Federal Information Security Management Act authorize this information collection for purposes of managing online comments. Comments and user names are part of our public records system, and user names are also part of our computer user records system. We may routinely use these records as described in our Privacy Act system notices. For more information on how we handle information that we collect, please read our privacy policy.