Study Examines Government Cloud Adoption and Shadow IT

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Next

Compromised Identities

Over the last two years, data breaches have become a fact of life. On an almost daily basis, news hits about another big breach that has potentially compromised data ranging from passwords to Social Security numbers to medical information.

According to a study by Joseph Bonneau at the University of Cambridge, 31 percent of passwords are reused in multiple places. The implication here is that, for 31 percent of compromised identities, an attacker could not only gain access to all the data in that cloud service, but potentially all the data in the other cloud ser­vices in use by that person as well.

Considering the average public sector employee uses more than 16 cloud services, and 37 percent of users upload sensitive data to cloud file-sharing services, the impact of one compromised account can be immense.

Skyhigh found that 96.2 percent of public sector organizations have users with compromised identities. At the average organization, 6.4 percent of users have at least one account that has been compromised. At the time of their analysis, they found that some accounts had been updated with new passwords, while many others remained active with compromised identities.

Federal, state and local governments are migrating to cloud services to take advantage of greater collaboration, agility and innovation at lower cost. However, despite clear benefits, 89 percent of IT professionals in government feel apprehension about migrating to the cloud.1 That being said, many public sector employees are less apprehensive and are adopting cloud services on their own, creating shadow IT. Under FITARA, U.S. federal CIOs have new obligations to not only oversee sanctioned cloud services procured by the agency, but also shadow IT, which has brought to light a great deal of uncertainty about how employees are using cloud services in government agencies.

To better understand these trends, Skyhigh Networks has published a "Cloud Adoption & Risk in Government Report." Findings were based on anonymized usage data for over 200,000 users in the public sector in the United States and Canada, rather than relying on surveys, which ask people to self-report their behavior.

1 Meritalk “The Fabric of Your Data: How to Manage Data in a Multi-Cloud, Multi-Vendor Environment”

 

Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

 
More Slideshows

RKONITGrowthFlexibility0x Building High-Growth IT: 5 Things to Know Now

Five factors IT pros need to consider when strategizing and constructing a computing platform built for growth and flexibility. ...  More >>

DataCtr11-290x195 5 Essential Elements in Building an Agile Data Center

Five key areas that are critical for successful data center modernization efforts include speed, quality of service (QoS), disaster recovery, predictive data analytics and manageability at scale. ...  More >>

cloud47-290x195 Multi-Cloud 101: 7 Things You Need to Know

Many organizations are beginning to consider use of a multi-cloud strategy, in which multiple cloud solutions are leveraged for a more complete and purpose-built cloud architecture. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.