Shadow IT and Infrequent Audits Open Door to Data Security Vulnerabilities in the Cloud

Advertise on CloudTweaks

Shadow IT and Infrequent Audits

Blancco Technology Group Study Finds 26 Percent of Organizations Have Limited Visibility into Use of All Cloud Storage Providers

Atlanta and London, October 12, 2016 – Lack of visibility into an organization’s use of cloud providers can lead to unauthorized access to data, improper handling and storage of data and improper data removal. As a result, organizations are left highly exposed and vulnerable to a data breach, reveals the “Lost in the Cloud: Data Security Challenges and Risks” research study released today by Blancco Technology Group (LON: BLTG).

Based on a survey of over 290 IT professionals in the US, Canada, Mexico, UK, Germany, France, India, Japan and China, the study indicates that 26 percent of organizations are either “not confident’ or ‘somewhat confident’ about their IT teams’ knowledge of the use of all cloud storage providers. Further exacerbating data security vulnerabilities in the cloud, 15 percent of organizations rarely or never conduct audits of cloud providers who are storing their corporate data.

Key findings from the study include:

  • Consolidation and diversification is the name of the cloud computing game. 89 percent of the surveyed IT professionals said they use a total of 1-15 private cloud storage providers and 92 percent use 1-15 public cloud storage providers.
  • Fighting off APTs, compromised credentials and hacked interfaces are top cloud security priorities. When we asked IT professionals to rank various cloud security threats in terms of their company’s priority – specific to budgets, resources and tools – the respondents cited advanced persistent threats (APTs), compromised credentials and hacked interfaces/APIs as being top priorities.
  • Data migration and data center decommissioning processes are fundamental to preventing data loss. 16 percent of organizations admitted that they ‘do not know’ what security precaution they would take to prevent data loss/theft when decommissioning/shutting down a cloud/virtual server.
  • Cloud storage needs defined audit processes and monitoring to stay compliant. Close to half (40 percent) of organizations believe storing corporate data in a cloud environment increases their compliance risk.

richardRichard Stiennon, Chief Strategy Officer of Blancco Technology Group, urges organizations to counter these data security vulnerabilities by conducting cloud compliance audits on a regular basis. “Whenever storing data offsite with a cloud provider, organizations must be diligent in knowing where their data is being stored, how it’s being protected and when it needs to be removed (in the case of migrating data to a new vendor or consolidating data centers, for example). A cloud compliance audit should include a review of policies and procedures that the cloud storage provider applies to your data, the technical solutions in place to protect your data and the skills of technical or business staff responsible for your data.

CloudBuzz

A curated, syndicated list of leading technology news stories from around the world. Leading and trending stories are researched curated each day covering prominent technology vendors in the connected technology space.

CONTRIBUTORS

Matthew Cleaver

Identifying Threats and Trusting a Third Party with Your Data

Third Party Data With data security breaches and identity thefts increasing every year, it is important for businesses to consider ...
The Future For Cyber Security Looks Uncertain

The Future For Cyber Security Looks Uncertain

Future For Cyber Security From the inception of the internet, cyber security has become increasingly more important. As the internet ...
Academia is on the Ropes but is Reluctant to Change. Why are Most of Them Digital Dinosaurs?

Academia is on the Ropes but is Reluctant to Change. Why are Most of Them Digital Dinosaurs?

“Moving a university is like moving a cemetery—you can’t expect any help from the inhabitants,” says Barb Oakley, Ph.D. Higher ...
6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications Although associated with the virtual currency bitcoin, blockchain technology can be applied across multiple industries, and it ...
Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

The Malware Cloud Concern This year we’ve had two cyber attacks in which malware was used to cripple government computer ...
Ransomware's Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to ...
Roundup Of Cloud Computing Forecasts, 2017

Roundup Of Cloud Computing Forecasts, 2017

Cloud Computing Forecasts Cloud computing is projected to increase from $67B in 2015 to $162B in 2020 attaining a compound ...
Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a ...

NEWS

Toyota to test self-driving, talking cars by about 2020

Toyota to test self-driving, talking cars by about 2020

TOKYO (Reuters) - Toyota Motor Corp (7203.T) on Monday said it would begin testing self-driving electric cars around 2020, which ...
CIOs Cutting Through the Hype and Delivering Real Value from Machine Learning, Survey Shows 

CIOs Cutting Through the Hype and Delivering Real Value from Machine Learning, Survey Shows 

New survey reveals progressive CIOs tap machine learning to solve everyday work problems SANTA CLARA, Calif. – October 17, 2017– A ...
IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

Big Blue back on the attack, analysts cautious (Reuters) - IBM shares surged 5 percent on Wednesday after the world’s ...

CloudTweaks CONTRIBUTOR PROGRAM

The CloudTweaks thought leadership profile building program is free to join but requires a commitment of atleast 3 articles over a 12-month period. Articles must be vendor-neutral in nature, related to connected cloud technologies and written by an executive level business representative to be considered.

You can also contact us to hear more about our on-demand content and lead generation programs for 2018