How Risky Behaviors Hurt Shadow IT Security

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next How Risky Behaviors Hurt Shadow IT Security-2 Next

Risky Behaviors Lead to Shadow IT

According to Martin Johnson, senior director, Cloud Security, Symantec, some of the most risky user behaviors when using any cloud application, but especially in shadow IT, include:

• Accidental oversharing of data
• Account compromise
• Data Exfiltration
• Data Destruction
• Malware Delivery

Shadow IT is the use of assets that don't fall under the management of the IT department, and, says Phil Richards, CSO of LANDESK, it can be a huge security problem, especially for those companies that don't have a strong IT department to monitor application and device use, or when policies are too restrictive to allow employees to do their work efficiently. "The existence and growth of shadow IT is usually a sign that the central IT organization is not meeting the needs of the business," says Richards. This means too many employees are going rogue to do their work.

This is putting both the network and its data at risk. For example, Symantec's Shadow Data Report analyzed the business readiness of over 15,000 cloud apps and services based on more than 60 security criteria. The result was that only 1 percent of these apps were found secure enough for business use. Many apps and services are already a security risk, but when they are used as shadow IT, the potential threats go unchecked.

 
 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.