Recent Post

How to Secure Your Data When Using Subcontractors

Today I want to talk to you about file permissions and the need to review those on a periodic basis. These are ultimately just files that you create on your computer. Many times, the files are on what we call a network share. The files are under the Q drive or the Z drive. You need to look at those files from not only a standpoint of archiving them or getting rid of them if they are old but also to see who has rights to them, who can view them, who can copy them, and who can delete them. This really puts your company at many risks.

One of the processes that I do when doing a network audit is to do a file permissions review. I make a long list of all the files and show who has access to read these files, who can copy them, who can delete them, and who has permission to the files.

It never fails, when doing a network audit; it is always alarming to the business owner or the point of contact that I am meeting with just how many people have access to their files.  They think, “Oh, my gosh, that’s the payroll file” or, “Oh, my gosh, that’s the 401K file” or, “Oh, my gosh, that’s the whole client list.”

Therefore, you really want to go in and you want to do an audit on who has the ability to view edit, delete those types of files. Because there are, many risks that are, living within those files that a lot of time goes overlooked.

If you would like to know who has access to your files or would like to find out more, just fill out the form below. I would be happy to meet with you and show you really a very easy way to determine who has access to your files. 

More Questions? Book Your Discovery Meeting



Phillip Long, CEO of BIS - Managed IT Services Provider


Phillip Long – CISSP, CEO of , along with his team of marketing and information technology experts, will walk you through an overview of what your business should be doing to protect your data and plan your digital marketing strategies.



You may reach out to us at:
Phone: 251-405-2555