Slick Cyber Systems is a managed service provider for I.T. services. Servicing customers worldwide we are often asked about cloud sharing and the implications of using them. So we review some concerns shared by many IT security professionals.
Public Cloud Concerns
In a recent
The IT leaders that were surveyed said popular cloud sharing services like Dropbox, Google Docs and Box just are not suitable for business uses. This conclusion was from a study by global software company Axway and the Ponemon Institute, an independent research firm.
Many in these IT professionals expressed concerns. They worry about their inability to know if sensitive or confidential data was lost or stolen due to a data breach in a “public cloud”. Of the 80 percent that voiced concerns they feel the bigger concern is the possible loss of intellectual propery.
“In recent years, employees have been increasingly adopting public cloud tools — such as Dropbox, Box, and Google Docs— to exchange and share documents and company information in the workplace,” said Dave Butcher, senior director of product portfolio management at Axway. “These tools provide a great user experience, but there are serious question marks about their enterprise-class security credentials, illustrated by the fact that many financial and healthcare organizations block their use.”
Do you know? Are your employees using files sharing
The research shows that 66 percent of businesses rank file sharing as a high or very high risk. Another concern is that many businesses don’t even know if their employees are using public cloud services. Nearly 70 percent of those surveyed said they are not likely to know whether employees are using unapproved and risky file-sharing tools.
“The results of this study definitively illustrate that organizations are highly concerned about the security risks posed by both public cloud and on-premise file-sharing tools, and they’re absolutely right to be wary of them,” said Larry Ponemon, chairman, and founder of the Ponemon Institute. “We’re acutely aware of the potentially catastrophic consequences that can occur as a result of security breaches of these tools.”
The study was based on surveys of 621 IT and IT security practitioners with involvement in setting IT security priorities, managing IT security budgets, selecting vendors and contractors, and evaluating program performance.