SlideShare a Scribd company logo
1 of 18
Download to read offline
Careless users in the cloud
(and what IT can do about it)
INTRODUCTION
Cloud computing has become a permanent addition to all types of businesses –
from startups to global corporations.
In the age of the cloud, employees enjoy greater accessibility and agility than
ever before.
But, as is often the case once new technology sees widespread use, new
behaviors emerge – some risky.

People who use SaaS applications were significantly more irresponsible about
password security, file transfer and IT compliance at work – exhibiting behaviors
that can expose corporate data to unintentional leaks and malicious attacks.

METHODOLOGY
Softchoice, a leading North American IT services and solutions provider, commissioned a study conducted by The Blackstone Group
to explore workers’ technology habits in the office. 1,000 full-time employees in the U.S. and Canada were asked about their
behavior around app security, remote access, file transfer and IT compliance.
PASSWORD SECURITY
PASSWORD SECURITY
IN THE CLOUD

10.2%

25%

Non-app users
SaaS app users

SaaS app users are 10x more
likely to store passwords
on unprotected or shared
drives.

29.1%

Non-app users
SaaS app users

People using SaaS apps for
work were 3x more likely to
keep passwords in an
unprotected document.

SaaS app users are over 2x
more likely to display their
passwords on Post-its.
Click me
to share!

10.4%

2.1%
Non-app users
SaaS app users

21%
NUMBERS GAME:
AGE OR QUANTITY?
The reason for shoddy password protection among SaaS application users is
found in the sheer number of apps employees access

28.5%

10.8%

Twenty-somethings

Baby Boomers

28.5% of twenty-somethings keep their app
passwords in plain sight, compared to 10.8%
of Baby Boomers.

36% of employees using SaaS apps for work
access five or more different apps on the job –
resulting in too many unique (or slight riffs on
the same) log-ins for them to memorize or
maintain securely.
SOLUTIONS:
PROVEN PASSWORD SECURITY
Good

Companywide password
security protocol.

Better

On-premise-based
single-sign-on tied to your
existing Directory Service
(e.g. Active Directory).

Best

Secure, cloud-based
single-sign-on solution tied to
your existing Directory Service
(e.g. Active Directory).
FILE TRANSFER
FILE TRANSFER & REMOTE ACCESS
SaaS APP USERS ARE…

59.1%

27.5%

Non-app users
SaaS app users

2x more likely to email the
work files they need to their
personal account.

17.7%

3.7%

Non-app users
SaaS app users

4x more likely to attempt
logging into a work account
associated with a former job.

…THAN NON SaaS APP USERS

27%

1.6%

Non-app users
SaaS app users

16x more likely to access work
files through an app that IT
doesn’t know they have.
CRIPPLED BY CONVENIENCE?
Once employees actively use cloud apps, it seems that the desire for instant
information gratification motivates their tech behavior beyond the cloud

Finding an app that makes one’s daily
job responsibilities easier is perceived
as more important than running that
download decision by IT. Unprotected
email exchanges and meddling into old
accounts becomes personally justifiable
by this “I need it now” attitude.

76% of SaaS app users have needed to
access work files away from the office,
compared to 58% of non-app users.
The cloud is therefore redefining how
employees approach their jobs overall,
not just how they use technology.
SOLUTIONS:
FOOLPROOF FILE TRANSFER
Good

Standardize on a cloud-based
collaboration platform solution
(e.g. Box).

Better

Best

Standardize on a cloud-based
collaboration platform solution,
coupled with a mobile device
management (BYOD) strategy.

Standardize on a cloud-based
collaboration platform solution,
coupled with a mobile device
management (BYOD) strategy.
Add a cloud platform to provide
end-user management and
reporting capabilities to
mitigate future risk.
IT COMPLIANCE
CLOUDING IT COMPLIANCE
Close to 1/3 of SaaS users reported downloading an app
without letting IT know. What’s encouraging this rogue behavior?

39% used the app for personal reasons first,
then started using it for work, blurring the
lines between personal and corporate use.
CLOUD-CONSCIOUS IT
37% of SaaS app users say
their IT departments get them
what they need.

37%

Non-app users

67%

SaaS app users

67% of SaaS users say IT is
responsive to them.

Almost half of SaaS app users (46%) said
that when an unsanctioned app is found,
their IT department provides a secure
equivalent.

46%

Non-app users

79%

SaaS app users

79% of all employees said their IT
department takes some form of action
when an unsanctioned SaaS app is found
in the office environment.
YOUR IT TEAM HAS A BETTER
REPUTATION THAN YOU THINK
Most employees feel that IT is responsive when accommodating new app
requests. And instead of turning a blind eye to rogue app downloads, IT often
deletes and blocks these programs, and finds safer alternatives.

What IT has failed to control is the flow of personal cloud use behavior into
the workplace. This presents a challenge for IT:

To initiate plans and
policies for long-term
conditioning.

To teach employees
best-use standards that
will protect them at work
and in their personal
lives.
SOLUTIONS: MOVING FROM
IT GATEKEEPER TO SaaS ENABLER
Good

Better

Best

Third-party scan of IT
environment to
uncover unsanctioned
SaaS app use.
Communicate risks of
this ‘shadow IT’ to
employees.

Scan to uncover
unsanctioned SaaS app
use. Communicate risks of
‘shadow IT’ to employees.
Provide a standard ‘safe’
vendor list for SaaS apps.

Standardized procurement of ‘safe’ list of
vetted SaaS apps, all accessed through
an identity management platform to
centralize provisioning and
deprovisioning capabilities via a cloud
portal, enabling lines of business to
make their own choices while
minimizing risk for IT.
CONCLUSION: CLOUD CONTROL
Looking at end-user cloud behavior, three curable issues emerge:

Employees are surpassing their
app threshold. Too many accounts
prohibits safe password
procedures.

Today’s employees don’t just use
technology differently, they work
differently.

Employees are undermining their
IT departments by failing to grasp
the risks of their lax behavior.

Next Steps

Next Steps

Next Steps

-Establish a company-wide
password policy or single-sign on
platform

-Adopt a cloud-based
collaboration solution
-Tie in a BYOD strategy

-Assess your IT environment
-Communicate shadow IT’s risks
-Consider an identity
management solution

Start solving one problem, and you’ll likely solve them all…
CLOUD CONTROL
Business leaders must empower the IT department to provide workers with
the apps they want (and need) to be productive

Step 1: Put the right pieces in place.
Implement the right policies,
procedures and cloud-ready
infrastructure to give IT the ability to
deploy and manage suitable SaaS apps
that employees need to be more
productive in (and away from)
the office.

Step 2: Regularly communicate the
secure, user-friendly cloud options at
employees’ disposal and how to access
them. As front-office staff increasingly
see IT promote secure and flexible
cloud technologies, they’ll become
more aware of their advantages and
more willing to comply with the rules.
Ready to put an end to
careless cloud use?
Contact us today to learn more about how Softchoice
makes it easier to source, implement and manage the
right cloud solutions for your organization.

softchoicecloud.com

1-800-268-7368

More Related Content

What's hot

Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013MassTLC
 
The Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyThe Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyCA Technologies
 
Digital Operations Excellence - PagerDuty Summit Series Keynote
Digital Operations Excellence - PagerDuty Summit Series KeynoteDigital Operations Excellence - PagerDuty Summit Series Keynote
Digital Operations Excellence - PagerDuty Summit Series KeynotePagerDuty
 
Taming the Technology of Digital Transformation
Taming the Technology of Digital Transformation Taming the Technology of Digital Transformation
Taming the Technology of Digital Transformation JoAnna Cheshire
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyDatto
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At WorkBlueboxer2014
 
Avoiding the “Technical Debt Collectors” with DevOps
Avoiding the “Technical Debt Collectors” with DevOpsAvoiding the “Technical Debt Collectors” with DevOps
Avoiding the “Technical Debt Collectors” with DevOpsCA Technologies
 
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business? Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business? IBM Social Business
 
A Shining Moment For Cloud Computing And SaaS
A Shining Moment For Cloud Computing And SaaSA Shining Moment For Cloud Computing And SaaS
A Shining Moment For Cloud Computing And SaaSAbaram Network Solutions
 
The ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social NetworkingThe ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social Networkingtibbr
 
Small Business Survey Report
Small Business Survey ReportSmall Business Survey Report
Small Business Survey ReportChris Crum
 
The ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from ForresterThe ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from Forrestertibbr
 
Global software survey results - sme preferences
Global software survey results - sme preferencesGlobal software survey results - sme preferences
Global software survey results - sme preferencesDaniel Smith
 
Top Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration SolutionsTop Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration SolutionsIBM Social Business
 
Take5 - NW2W for SMB US
Take5 - NW2W for SMB USTake5 - NW2W for SMB US
Take5 - NW2W for SMB USUnifyCo
 
Take5 - NW2W for SMB UK
Take5 - NW2W for SMB UKTake5 - NW2W for SMB UK
Take5 - NW2W for SMB UKUnifyCo
 
Using cloud tools to build enterprise mobile apps with APIs fast
Using cloud tools to build enterprise mobile apps with APIs fast Using cloud tools to build enterprise mobile apps with APIs fast
Using cloud tools to build enterprise mobile apps with APIs fast Max Katz
 

What's hot (20)

Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
 
The Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyThe Five Essential Truths of the Application Economy
The Five Essential Truths of the Application Economy
 
Digital Operations Excellence - PagerDuty Summit Series Keynote
Digital Operations Excellence - PagerDuty Summit Series KeynoteDigital Operations Excellence - PagerDuty Summit Series Keynote
Digital Operations Excellence - PagerDuty Summit Series Keynote
 
Taming the Technology of Digital Transformation
Taming the Technology of Digital Transformation Taming the Technology of Digital Transformation
Taming the Technology of Digital Transformation
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At Work
 
Avoiding the “Technical Debt Collectors” with DevOps
Avoiding the “Technical Debt Collectors” with DevOpsAvoiding the “Technical Debt Collectors” with DevOps
Avoiding the “Technical Debt Collectors” with DevOps
 
Cloud Survey
Cloud SurveyCloud Survey
Cloud Survey
 
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business? Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
 
A Shining Moment For Cloud Computing And SaaS
A Shining Moment For Cloud Computing And SaaSA Shining Moment For Cloud Computing And SaaS
A Shining Moment For Cloud Computing And SaaS
 
The ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social NetworkingThe ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social Networking
 
Small Business Survey Report
Small Business Survey ReportSmall Business Survey Report
Small Business Survey Report
 
Living in the Cloud
Living in the CloudLiving in the Cloud
Living in the Cloud
 
The ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from ForresterThe ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from Forrester
 
Global software survey results - sme preferences
Global software survey results - sme preferencesGlobal software survey results - sme preferences
Global software survey results - sme preferences
 
Enterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and BeyondEnterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and Beyond
 
Top Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration SolutionsTop Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration Solutions
 
Take5 - NW2W for SMB US
Take5 - NW2W for SMB USTake5 - NW2W for SMB US
Take5 - NW2W for SMB US
 
Take5 - NW2W for SMB UK
Take5 - NW2W for SMB UKTake5 - NW2W for SMB UK
Take5 - NW2W for SMB UK
 
Using cloud tools to build enterprise mobile apps with APIs fast
Using cloud tools to build enterprise mobile apps with APIs fast Using cloud tools to build enterprise mobile apps with APIs fast
Using cloud tools to build enterprise mobile apps with APIs fast
 

Similar to Careless Users In the Cloud (And What IT Can Do About It)

EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidencePaul Richards
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceKeith Purves
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling modelJose Guerrero
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app controlAneel Mitra
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 
The advantages of Cloud Application Control
The advantages of Cloud Application ControlThe advantages of Cloud Application Control
The advantages of Cloud Application ControlWeb Werks Data Centers
 
Data Security Issues in Cloud Computing
Data Security Issues in Cloud ComputingData Security Issues in Cloud Computing
Data Security Issues in Cloud ComputingAsad Ali
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)IndusfacePvtLtd
 
Learn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentLearn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentStave
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxwhitneyleman54422
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 

Similar to Careless Users In the Cloud (And What IT Can Do About It) (20)

EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling model
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
The advantages of Cloud Application Control
The advantages of Cloud Application ControlThe advantages of Cloud Application Control
The advantages of Cloud Application Control
 
Data Security Issues in Cloud Computing
Data Security Issues in Cloud ComputingData Security Issues in Cloud Computing
Data Security Issues in Cloud Computing
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
 
Learn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentLearn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow Investment
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docx
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 

More from Softchoice Corporation

Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingSoftchoice Corporation
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingSoftchoice Corporation
 
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...Softchoice Corporation
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoverySoftchoice Corporation
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en actionSoftchoice Corporation
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice Corporation
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Softchoice Corporation
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Corporation
 
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarEffective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarSoftchoice Corporation
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice Corporation
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With AzureSoftchoice Corporation
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice Corporation
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Corporation
 
From Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsFrom Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsSoftchoice Corporation
 
Everything you need to know about SQL Server 2016
Everything you need to know about SQL Server 2016Everything you need to know about SQL Server 2016
Everything you need to know about SQL Server 2016Softchoice Corporation
 

More from Softchoice Corporation (20)

Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
 
Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern Licensing
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern Licensing
 
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recovery
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en action
 
Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
 
Azure cloud governance deck
Azure cloud governance deckAzure cloud governance deck
Azure cloud governance deck
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
 
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarEffective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) Webinar
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuage
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost Governance
 
THE ECONOMICS OF AZURE MANAGEMENT
THE ECONOMICS OF AZURE MANAGEMENTTHE ECONOMICS OF AZURE MANAGEMENT
THE ECONOMICS OF AZURE MANAGEMENT
 
From Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsFrom Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster Proportions
 
Everything you need to know about SQL Server 2016
Everything you need to know about SQL Server 2016Everything you need to know about SQL Server 2016
Everything you need to know about SQL Server 2016
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Careless Users In the Cloud (And What IT Can Do About It)

  • 1. Careless users in the cloud (and what IT can do about it)
  • 2. INTRODUCTION Cloud computing has become a permanent addition to all types of businesses – from startups to global corporations. In the age of the cloud, employees enjoy greater accessibility and agility than ever before. But, as is often the case once new technology sees widespread use, new behaviors emerge – some risky. People who use SaaS applications were significantly more irresponsible about password security, file transfer and IT compliance at work – exhibiting behaviors that can expose corporate data to unintentional leaks and malicious attacks. METHODOLOGY Softchoice, a leading North American IT services and solutions provider, commissioned a study conducted by The Blackstone Group to explore workers’ technology habits in the office. 1,000 full-time employees in the U.S. and Canada were asked about their behavior around app security, remote access, file transfer and IT compliance.
  • 4. PASSWORD SECURITY IN THE CLOUD 10.2% 25% Non-app users SaaS app users SaaS app users are 10x more likely to store passwords on unprotected or shared drives. 29.1% Non-app users SaaS app users People using SaaS apps for work were 3x more likely to keep passwords in an unprotected document. SaaS app users are over 2x more likely to display their passwords on Post-its. Click me to share! 10.4% 2.1% Non-app users SaaS app users 21%
  • 5. NUMBERS GAME: AGE OR QUANTITY? The reason for shoddy password protection among SaaS application users is found in the sheer number of apps employees access 28.5% 10.8% Twenty-somethings Baby Boomers 28.5% of twenty-somethings keep their app passwords in plain sight, compared to 10.8% of Baby Boomers. 36% of employees using SaaS apps for work access five or more different apps on the job – resulting in too many unique (or slight riffs on the same) log-ins for them to memorize or maintain securely.
  • 6. SOLUTIONS: PROVEN PASSWORD SECURITY Good Companywide password security protocol. Better On-premise-based single-sign-on tied to your existing Directory Service (e.g. Active Directory). Best Secure, cloud-based single-sign-on solution tied to your existing Directory Service (e.g. Active Directory).
  • 8. FILE TRANSFER & REMOTE ACCESS SaaS APP USERS ARE… 59.1% 27.5% Non-app users SaaS app users 2x more likely to email the work files they need to their personal account. 17.7% 3.7% Non-app users SaaS app users 4x more likely to attempt logging into a work account associated with a former job. …THAN NON SaaS APP USERS 27% 1.6% Non-app users SaaS app users 16x more likely to access work files through an app that IT doesn’t know they have.
  • 9. CRIPPLED BY CONVENIENCE? Once employees actively use cloud apps, it seems that the desire for instant information gratification motivates their tech behavior beyond the cloud Finding an app that makes one’s daily job responsibilities easier is perceived as more important than running that download decision by IT. Unprotected email exchanges and meddling into old accounts becomes personally justifiable by this “I need it now” attitude. 76% of SaaS app users have needed to access work files away from the office, compared to 58% of non-app users. The cloud is therefore redefining how employees approach their jobs overall, not just how they use technology.
  • 10. SOLUTIONS: FOOLPROOF FILE TRANSFER Good Standardize on a cloud-based collaboration platform solution (e.g. Box). Better Best Standardize on a cloud-based collaboration platform solution, coupled with a mobile device management (BYOD) strategy. Standardize on a cloud-based collaboration platform solution, coupled with a mobile device management (BYOD) strategy. Add a cloud platform to provide end-user management and reporting capabilities to mitigate future risk.
  • 12. CLOUDING IT COMPLIANCE Close to 1/3 of SaaS users reported downloading an app without letting IT know. What’s encouraging this rogue behavior? 39% used the app for personal reasons first, then started using it for work, blurring the lines between personal and corporate use.
  • 13. CLOUD-CONSCIOUS IT 37% of SaaS app users say their IT departments get them what they need. 37% Non-app users 67% SaaS app users 67% of SaaS users say IT is responsive to them. Almost half of SaaS app users (46%) said that when an unsanctioned app is found, their IT department provides a secure equivalent. 46% Non-app users 79% SaaS app users 79% of all employees said their IT department takes some form of action when an unsanctioned SaaS app is found in the office environment.
  • 14. YOUR IT TEAM HAS A BETTER REPUTATION THAN YOU THINK Most employees feel that IT is responsive when accommodating new app requests. And instead of turning a blind eye to rogue app downloads, IT often deletes and blocks these programs, and finds safer alternatives. What IT has failed to control is the flow of personal cloud use behavior into the workplace. This presents a challenge for IT: To initiate plans and policies for long-term conditioning. To teach employees best-use standards that will protect them at work and in their personal lives.
  • 15. SOLUTIONS: MOVING FROM IT GATEKEEPER TO SaaS ENABLER Good Better Best Third-party scan of IT environment to uncover unsanctioned SaaS app use. Communicate risks of this ‘shadow IT’ to employees. Scan to uncover unsanctioned SaaS app use. Communicate risks of ‘shadow IT’ to employees. Provide a standard ‘safe’ vendor list for SaaS apps. Standardized procurement of ‘safe’ list of vetted SaaS apps, all accessed through an identity management platform to centralize provisioning and deprovisioning capabilities via a cloud portal, enabling lines of business to make their own choices while minimizing risk for IT.
  • 16. CONCLUSION: CLOUD CONTROL Looking at end-user cloud behavior, three curable issues emerge: Employees are surpassing their app threshold. Too many accounts prohibits safe password procedures. Today’s employees don’t just use technology differently, they work differently. Employees are undermining their IT departments by failing to grasp the risks of their lax behavior. Next Steps Next Steps Next Steps -Establish a company-wide password policy or single-sign on platform -Adopt a cloud-based collaboration solution -Tie in a BYOD strategy -Assess your IT environment -Communicate shadow IT’s risks -Consider an identity management solution Start solving one problem, and you’ll likely solve them all…
  • 17. CLOUD CONTROL Business leaders must empower the IT department to provide workers with the apps they want (and need) to be productive Step 1: Put the right pieces in place. Implement the right policies, procedures and cloud-ready infrastructure to give IT the ability to deploy and manage suitable SaaS apps that employees need to be more productive in (and away from) the office. Step 2: Regularly communicate the secure, user-friendly cloud options at employees’ disposal and how to access them. As front-office staff increasingly see IT promote secure and flexible cloud technologies, they’ll become more aware of their advantages and more willing to comply with the rules.
  • 18. Ready to put an end to careless cloud use? Contact us today to learn more about how Softchoice makes it easier to source, implement and manage the right cloud solutions for your organization. softchoicecloud.com 1-800-268-7368