Latest Netskope Report: Security Nightmare For IT Departments

App Sharing Most Used

Security Nightmare For IT Departments

Netskope have today released the findings of their quarterly ‘Cloud Report’. The report, which complies the foremost trends on cloud app adoption and usage, discovered the emergence of several new trends. Chief among them was the ever-increasing number of apps that enable some kind of sharing and the security concerns which accompany them.

Sharing has traditionally been considered as something primarily done through cloud storage apps (where for every one upload there are three shares), however, the report notes that one out of every five apps in used on Netskope’s cloud app analytics platform (the ‘Netskope Active Platform’) now has sharing enabled. Additionally, forty nine of the fifty five app categories which the company track had sharing features.

The report found that top ten (non-storage) most frequently used apps for sharing were, in decreasing order, Facebook, Salesforce, Yammer, LinkedIn, Workday, Evernote, Zoho, QuickBooks, Trello and Concur. Sharing of this nature is a security nightmare for IT departments – although they are the ones who are responsible for protecting businesses against online threats, they often lack any useful insight into which apps are running in their environments, which of those apps allow sharing, and whether their data is being uploaded through those apps…

Security Nightmare For IT Departments

The varying context and content of sharing means it can either be a very risky or very benign procedure. At the bottom end of the scale is something as simple as sharing a photograph, whereas at the more worrying end of the scale is company executives accidentally sharing confidential information, accountants giving an organisation’s financial details to media outlets or other company ‘insiders’ providing non-public data to unauthorised personnel.

Netskope CEO Sanjay Beri commented on this growth of sharing upon the release of the report, “There’s been a considerable increase in usage of apps that include sharing functionality – many of which are unsanctioned”. Adding, “this goes beyond traditional cloud storage apps; more and more, employees are sharing sensitive data through these apps and introducing new security and compliance challenges to enterprises. The good news here is that IT is increasingly aware of this phenomenon and taking steps to effectively monitor all apps being used in the network to neutralize these issues”.

Elsewhere, the report also found that enterprises are continuing to adopt cloud apps at a growing rate – the average number in use per business grew to 508 in this quarter, up from 461 last quarter. Despite the positive growth news, a more worrying fact to come to light was that a vast number of the apps in use were not enterprise ready (88.4 percent), and these apps accounted for 73.6 percent of total app usage. It’s something we looked at in detail at the start of June and it seems little has changed – in fact, both figures are up on last quarter.

Finally, it was noted that the most frequent cloud app activities that constituted policy violations were logins, downloads, edits, views and creating. Apps falling in the categories of CRM, HR, finance and storage the most regular offenders – though it was noted that what could constitute a policy violation could vary between categories.

By Daniel Price

Kayla Matthews

New Security Regulation – Cybersecurity Maturity Model Certification (CMMC)

Cybersecurity Maturity Model Certification Changes are on the horizon for the Department of Defense (DoD) and its contractors. Late last year, the DoD announced the Cybersecurity Maturity Model Certification (CMMC), which officially released in January. The ...
Anita Raj

The Criticality of Data Governance in a Multi-cloud Environment

The Criticality of Data Governance Multi-cloud has emerged as an enterprise favorite in almost no time.  In fact, Security Boulevard  makes a reference to a Forrester Research Report which confirms that almost 86 percent of ...
David Gevorkian

Website Accessibility: Compliancy, Laws and Best Practices

Key to Making Your Website Accessible The internet has changed the education sector in so many ways. With e-learning, more people around the globe are able to access high-quality education and advance their careers. E-learning ...
Steve Prentice

Cloud-Based Financial Software Reinforces the 80/20 Rule of Business Management

Cloud-Based Financial Software Sponsored by Sage 50cloud Small businesses are known for being innovative and customer-focused in a way that their larger competitors cannot. This transforms into a significant advantage. In fact, the ability for ...
Martin Mendelsohn

New Executive Roles in the Post-Corona Era

Executive Roles in the Post-Corona Era As the global economy shows early signs of reviving from past months of rigormortis, forward-looking companies will be busy preparing for the next pandemic. What this means for technology ...
Robots

How DSPs can Improve Straight Through Processing Rate in RPA Implementations by up to 82%

Robotic Process Automation Digital Service Providers (DSPs) today are well placed to take advantage of next-generation technologies like Robotic Process Automation (RPA), Machine Learning, and Artificial Intelligence. As most of the smart DSPs have already ...