Business and IT Glossary  > Find My File

Find My File

Few workers know where the information they create goes after it's delivered to a first party, and large data losses are usually attributed to cybersecurity break-ins. To radically reduce this problem, owners should be able to maintain a "digital leash" on each file that enables the creator to block movement or copying of content. It should be a priority to enable each file to recognize its source (creator), track its location, and report activity to the content owner.

Key Find My File attributes would include contact details, view history, IP addresses that the file has passed through, existence limits (i.e., time before it deletes itself), and more. These DNA-like characteristics would need to be encrypted and could be part of the operating system or part of individually equipped applications.

Additionally, a communication mechanism would need to be in place in these files to report activity to file owners.

 

Related Research

It's Time for "Find My File"

It is time for greater recognition of technology threats and the information leakage problem. With find-my-file technology, IT security leaders can better prevent cybersecurity break-ins and large data losses.

Related Webinar

Actionable Insights for 2019: Top 10 Predictions

Next-generation technologies such as blockchain, AI, machine learning, and intelligent content analytics have the ability to transform cybersecurity strategies and the digital security market in the future.

[free webinar]
[free webinar]
[free webinar]
[free webinar]
[s]
[s]
[s]
[s]