Why You Should Inventory Business Cloud Use
Do you know where your data is? For your company's safety, it's critical to know how employees are using the cloud
For a few hours on June 20, anyone who wanted to log on to cloud-based storage provider Dropbox could do so without a password.
Dropbox blamed the incident on a bug. And chances are some businesses didn't even know about the potential exposure of their data.
Too bad so many IT managers don't appear to be on top of the issue. In fact, many IT managers apparently have no idea what cloud-computing services their employees are using. A survey from the Ponemon Institute released in May showed the extent of the problem. According to the research, 50 percent of IT professionals say their organizations are unaware of all the cloud services used in their enterprises.
That figure could be misleading. Anton Chuvakin, principal at Security Warrior Consulting, says it's difficult to measure because the definition of "cloud computing" is so slippery. Do the IT pros consider Gmail to be cloud computing, for instance?
But in general, cloud use is exploding. Employees in your organization are increasingly going to turn to cloud tools that allow them to do their jobs expediently and economically, whether you're on board or not.
Tim Bajarin, president of Creative Strategies, a consultancy in Campbell, Calif., says he's not surprised at the Ponemon findings. "There are so many apps that let employees access them anytime, anywhere," he says. "It's hard for the IT people to keep up." And it doesn't help that new cloud services seem to come out every week.
Taking steps to monitor and direct corporate cloud computing use by employees isn't really that difficult. The key is to take a proactive approach. Among the recommendations by experts:
Understand your mission.
Consider whether you're looking to prevent data leaks or stay on top of information governance. As Chuvakin points out, when you use cloud computing for sensitive information, security is paramount. "If I'm writing a white paper for a client that includes intellectual property and it's in Google Docs, then it's not a question of ‘Has anyone else seen it?' as ‘Am I 100-percent certain no one else has?'" Many cloud providers do provide that assurance, says Chuvakin, so it pays to ask and shop around.
Know why your employees use the cloud.
You can learn from how your end users use cloud services, say the experts. For instance, employees might be using Gmail because the search is so much better than the work email's search. "You should really look into why people aren't using your work software. There might be a good reason," says Chuvakin.
Inventory corporate cloud use and providers.
Take full inventory of which cloud-computing services your organization and your employees are using. Assess your cloud-computing providers and the risks involved in using them. Do this on an ongoing basis, as cloud computing evolves rapidly.
Create guidelines for cloud-computing use by employees. Do you want to prohibit employees from putting company files in the cloud? How do you foresee employees using the cloud?
Be the provider.
Create your own version of Dropbox or other cloud-based applications.
Keep sensitive data off-limits.
Consider some data off-limits to the cloud and communicate this policy to employees. The Ponemon survey showed that 68 percent of IT pros thought cloud computing was too risky for storing financial information or intellectual property. Fifty-five percent said they wouldn't store health records in the cloud.
Photo Credit: @iStockphoto.com/track5
- 4 Strategies to Avert Virtual Arguments
- Cloud Computing 101: Protect Yourself Online
- How to Recover From a Social Media Mistake
- Why You Should Inventory Business Cloud Use
- Emerging Technology Has Positive Impact in Classroom
- 4 Apps to Manage Your Contacts
- Portable Tech Gadgets You Need This Summer
- Best Tablets for Your Business
- Security Tips for Your Smartphone or Tablet
- 5 New Cloud Tools You'll Love
- Can a Tablet Replace Your Laptop?
- Why Wireless Needs a Network of Networks
- 5 Steps to a Successful Enterprise Wireless Strategy
- 5 Keys for Moving Enterprise Security to the Cloud
- Tips for Building and Deploying Cloud-based Apps
- 5 Business Lessons You Can Learn From Mark Zuckerberg
- Russia: The No. 1 Base of Global Internet Attacks
- Researchers Say New Botnet TDL-4 Poses Big Threat
- The Internet Grows Up
- Ten Ways to Keep Your Online Information Secure
- How Facebook and Your Free Time Can Get You Fired
- The Only 10 Android Health Apps You Need
- Connected TV
- Near-Field Communication Technology the Next Big Thing
- The Future of 3-D Video
- Is Your Teen Sexting?
- Should You Ban Your Tweens From Facebook?
- Home Movies: Then and Now
- Is Social Media Malware Infecting Your Business?
- Is Your Tween (Illegally) on Facebook?
- Are Free Public Wi-Fi Networks Safe?
- Explosion of Creativity: Power of Online Communities
- The Future According to Google
- 5 Cheap Alternatives to Hiring a Personal Trainer
- When Your Dream Company is Hiring on Twitter
- Colleges Bring Campuses to Facebook
- Technology Powers Revolutions and Saves Lives
- Best Photo Apps
- Virtual World No Substitute for Real One
- Best Phone Apps for Busy Women
- How to Prevent Identity Theft
- How to Use Facebook So It Does not Use You
- Worst-case Computer Scenarios
- Google Chrome OS Notebook: A Security Game Changer?
- What Is Cloud Computing?
- How to Prevent Data Breaches
- Best Tips for Sharing Videos
- Do You Need an iPad for Your Small Business?
- The App Guide: 5 Must-have Shopping Apps
- Project Management Tips From the Pros
- Finding the Right Skill Set
- Who's Gawking at Your Photos?
- Dealing With Virtual Stalking
- CES 2011 Report - Consumer Electronics Show
- Time to Gear up for 3-D TV?
- How to Get the Best Service From IT Vendors
- Dating Apps: The Lowdown
- New Website Streamlines College-Aid Application
- Gift-card Resale Market Thrives Online
- Stop Cyberbullying Now!
- 5 Cloud Tools to Boost Your Productivity
- Mobile Pay Can Give You an Edge
- How to Find the Best Deals Online
- Should You 'Friend' Your Teens Online?
- Should You Really Post That Comment?
- 5 Smart Tactics for LinkedIn Self-Promotion
- How Repressive Regimes Use the Internet to Keep Power
- WikiLeaks: Diplomacy as Usual
- The Rising Threat of USB Drives
- Integrate Cloud Solutions With Caution
- Tech Solutions to Track Your Resolutions
- Crash Course in Computer Maintenance
- How to Pick the Right Cloud Provider
- Web Tools for Starting a Small Business
- 4 Life-changing Resolutions You Can Stick to
- Create Your Own Social Network
- What the Web Says About You
- FTC Chairman: 'Do Not Track' Rules Would Help Web Thrive
- 'Do Not Track' Rules Would Put a Stop to the Internet As We Know It
- Are Federal 'Do Not Track' Rules Needed?
- The Political Power of Social Media
- Top 3 Kid-safe Social Networks
- 5 Ways to Cultivate Your Kids' Online Reputation
- Preparing Our Children for Global Digital Citizenship Success
- The Great E-reader Roundup
- The NFL's Highest-scoring Apps
- New Gadgets Straight From the Big Screen
- A Game Plan for Protecting Stored Data
- The Drive for Real-time Collaboration
- Hang Onto People Who'll Help You Advance
- Leading New Developments in Visual Computing
- Meet Mr. Industrial: Justin Lassen's Music Machine
- Must-see TV on the Internet
- Share Safely on Social Networks
- 6 Essential Rules for Safe Online Shopping
- Five Steps to Kid-friendly Surfing
- High-tech Help for Weight Loss
- Create a Web Site or Blog for Your Family
- Video Eyewear for Sunglass Cinema
- Smart Phone Apps Help Stop Distracted Driving
- Online Computer Backup Services Remove Hassle
Copyright © 2011 Studio One Networks. All rights reserved.