Just like clouds can hide sunshine, they can also hide user activity from the security controls deployed by the business in the world of IT.
According to a survey of 1,000 consumers by ResearchNow, a third of the IT professionals and administrators said they had downloaded an application they were not authorized to use on a corporate device in order to do their job. That number compared to just 15 percent of respondents overall. In addition, 67 percent of IT pros and administrators admitted to downloading an app they use for work on a personal device such as a phone, laptop or tablet.
“It is clear that employees, in particular the IT department, only want to do the very best for their companies and will seek out ways to be more efficient and produce quality work,” said Gil Zimmerman, CEO and co-founder of CloudLock, in a statement. “As a business owner, why would you want to get in their way?”
CloudLock commissioned the survey, which also found that nearly one-third of IT respondents said they had knowingly ignored a security policy/best practice in order to do their job. Only 16 percent of those in other professions said they had done so.
The survey echoes a similar study performed recently by CipherCloud, which found that unsanctioned use of cloud applications is widespread. According to CipherCloud, the average global enterprise uses more than 1,100 cloud applications, with the typical North American enterprise using more than 1,245. However the study found that 86 percent of cloud applications used by enterprises are unsanctioned ‘shadow IT’.
Likewise, a survey last year from the Cloud Security Alliance (CSA) argued that many enterprises underestimate the number of cloud applications their employees are running as well.
“Rampant cloud adoption has given shadow IT a far bigger footprint than previously recognized,” said Pravin Kothari, founder and CEO of CipherCloud, in a statement. “This introduces a multi-pronged problem for companies. It is hard, if not impossible, to protect against something you cannot see. And worse, each unsanctioned application is a vehicle for introducing a host of other risks into the enterprise.”
The bring-your-own device trend continues to pose challenges as well. According to the CloudLock study, nearly a third of people have downloaded an application on their personal devices that they needed to log into with their work/network credentials. For IT pros, that number jumps to 53 percent.
“Companies need to allow employees to work how they want to work and arm them with the tools needed to drive company innovation, collaboration and ultimately growth while providing broad guardrails to ensure critical company assets are protected,” said Zimmerman.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Ferrari Says Ransomware Attack Exposed Customer Data
- Aembit Scores $16.6M Seed Funding for Workload IAM Technology
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
