Study Examines Government Cloud Adoption and Shadow IT

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Study Examines Government Cloud Adoption and Shadow IT-8 Next

Top 20 Consumer Apps in the Enterprise

Today, many consumer applications are so useful, employees use them in their everyday work. This can cause headaches for IT if government data is stored in unsanctioned cloud services known as “shadow IT.” Attackers can also use these services as vehicles to exfiltrate data. For example, Skyhigh discovered attacks that targeted sensitive company IP, and then leveraged Twitter to exfiltrate the stolen data 140 characters at a time. Their security intelligence team also identified a novel attack that steals sensitive data by encoding the data into video files before uploading them to YouTube, where attackers can then download the information and decode it.

Federal, state and local governments are migrating to cloud services to take advantage of greater collaboration, agility and innovation at lower cost. However, despite clear benefits, 89 percent of IT professionals in government feel apprehension about migrating to the cloud.1 That being said, many public sector employees are less apprehensive and are adopting cloud services on their own, creating shadow IT. Under FITARA, U.S. federal CIOs have new obligations to not only oversee sanctioned cloud services procured by the agency, but also shadow IT, which has brought to light a great deal of uncertainty about how employees are using cloud services in government agencies.

To better understand these trends, Skyhigh Networks has published a "Cloud Adoption & Risk in Government Report." Findings were based on anonymized usage data for over 200,000 users in the public sector in the United States and Canada, rather than relying on surveys, which ask people to self-report their behavior.

1 Meritalk “The Fabric of Your Data: How to Manage Data in a Multi-Cloud, Multi-Vendor Environment”


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.