Prior to the advent of the social web and sharing networks, computer networks had clear, defined perimeters and advanced security strategies to protect them. The evolution of technology has nevertheless brought about changes that these strategies could not bear.
Now, the cloud, the Internet and mobile devices, all of which contributing to the borderless networks we know, have an impact on the growth of potential attacks on computer networks. Moreover, most computer networks have an architecture that makes it possible to navigate easily within their perimeter. If a network is penetrated, the intruder can easily access the data that is available.
It is therefore essential to consider the ways in which information can leave your network. For example, using unauthorized applications such as Hightail or Dropbox demonstrates that information can leave our network in a multitude of ways and be easily extracted during an intrusion.
All this raises a growing concern within companies and that is why IT security has become such an urgent issue!