Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise

11
Decriminalize your Colleagues How to address Shadow IT in the enterprise

Transcript of Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise

Page 1: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

Decriminalize your ColleaguesHow to address Shadow IT in the

enterprise

Page 2: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

When an employee receives or shares a file through a high-risk platform, are they committing a heinous security crime or

just doing their job?

The Box strategy for addressing Shadow IT in the Enterprise doesn’t place the blame on employees.

Page 3: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

How big is the file sharing universe?

The average company uses 49 file sharing services.

An increase of 104% since 2014 1

File sharing accounts for 39% of corporate data uploaded to the cloud 2

1, 2 Skyhigh, Cloud Adoption Risk Report, Q1 2015

Page 4: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

3 Skyhigh, Cloud Adoption Risk Report, Q1 2015

Page 5: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

Is your confidential data protected?

22% of all files in the cloud contain confidential data 4

37% of employees have uploaded at least one file containing confidential data 5

4, 5 Skyhigh, The Definitive Guide to Cloud Security

Page 6: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

Most file sharing services aren’t equipped to encrypt confidential data

Only 26% have 256-bit encryption or higher 7

Only 40% encrypt data at rest 6

Less than 1% offer customer managed encryption keys 8

6-8 Skyhigh Cloud Adoption Risk Report

Page 7: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

39% have identity federation 10

21% offer multi-factor authentication 9

Many services lack adequate identity and authorization controls…

Only 50% provide granular access controls 11

24% include IP filtering support 12

9-12 Skyhigh Cloud Adoption Risk Report

Page 8: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

… Or proper transparency and threat mitigation

Less than 44% conduct pen-testing 14

Only 1% have malware protection 15

59% have user activity logging 16

29% have app security measures (CSRF, SQLi,

XSS) 17

14-17 Skyhigh Cloud Adoption Risk Report

Page 9: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

So, what’s an IT manager to do?

Page 10: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

Four steps you can take to address Shadow IT

AssessIdentify your high-risk services, using network and expense audits

AnalyzeCreate a security checklist to identify secure tools and services

SecureSelect tools that meet those requirements, and train employees to use them

ImproveDesign a strategy for reviewing new applications and risks

Page 11: Decriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise

Next, manage Shadow IT. Learn what you need to make a file sharing service truly

secure:

Secure File Sharing Basics eBook