SlideShare a Scribd company logo
1 of 1
Download to read offline
How Is Your
Data Shared?
10 Surprising Stats
10 STATISTICS THAT REVEAL THE RISKS TO SECURITY WHEN
SHADOW I.T IS USED FOR DATA SHARING, ON A SCALE THAT
I.T LEADERS ARE ONLY JUST BEGINNING TO GRASP.
BOB DIMICCO, GLOBAL LEADER AND FOUNDER OF CISCO’S
CLOUD CONSUMPTION SERVICE PRACTICE
“IT has lost control here
because organizations,
lines of business are saying
I can go to the web and get
an application or a service
within minutes and start
being productive.”
74%
Of European IT leaders say they have an incomplete
understanding of their organisations: this must be reversed if
they are to turn Shadow IT into a positive opportunity to meet
internal and external data sharing needs.
1:
2:
FALLING SHORT
88%
Of cloud applications are not enterprise-ready. But this will
not stop determined employees from using them if they can
expect quick benefits and boost productivity – and you aren’t
providing the right alternative.
Put another way…
3:
NON-COMPLIANT
Of cloud services don’t meet existing compliance requirements.
Their continued unchecked use is leaving a gaping hole in data
security, even in the most regulated sectors.
7%
4:
HEAD IN THE SAND?
89%
Of UK CIOs don’t apply the same I.T service
management processes to applications running in the
public cloud as they do to internal applications – a head-
in-the-sand approach which fails to account for the
extent of Shadow I.T-enabled data sharing.
5:
KNOWLEDGE GAP
37%
Of CSOs suspect that individual users or business units regularly use
applications or put data in the cloud without consulting IT. But why
don’t they know for sure?
ANARCHY RULES
31%
Of organisations have no security policies, procedures or tools in
place to specifically address the use of external cloud services. If
end-users don’t know the rules, why should they give a second
thought to data security when they are seizing the initiative and
using Shadow I.T to get a task well done?
6:
7:
FINANCIAL HIT
$13.5 million
The potential cost to a business of theft or compromised security
when data is exposed in the cloud via storage service providers
such as DropBox or Google Drive, including compliance-related
fines.
INTERNAL ASSUMPTIONS
70,000
8:
The number of documents out of 2.5 million files, stored
for internal use in Google Drive, which one media company
discovered was publicly exposed during an audit.
9:
SHARING AND CARING
26%
10%
The volume of documents broadly shared by every individual
user in the cloud, of which...
Contain compliance-related data – an alarm call for
every IT leader: Shadow IT applications are your
responsibility, too!
LICENCE TO SAVE
$140
10:
The amount of licence savings lost per person when a business lets
its employees choose their own cloud services and applications. A
well-conceived unified communications strategy could cut costs
and reinforce data security.
MATT CAIN, RESEARCH VICE PRESIDENT, GARTNER
“Organisations that formally
embrace and extend the digital
competencies of their employees
will experience improved
business outcomes and gain
competitive advantage.”
IT’S EASY - AND DANGEROUS - TO IGNORE THE SCALE ON WHICH YOUR
DATA IS PROBABLY BEING SHARED IN THE PUBLIC CLOUD.
THE EXTENT TO WHICH YOUR PEOPLE ARE USING SHADOW IT SHOULD
TELL YOU A LOT ABOUT WHAT THEY REALLY NEED TO HELP THEM SHARE
DATA SECURELY.
BY FAR THE MAJORITY OF CLOUD APPLICATIONS WOULD FAIL YOUR
COMPLIANCE TEST - SO MAKE IT YOUR PRIORITY TO DISCOVER WHY
PEOPLE ARE STILL USING THEM IN YOUR BUSINESS.
SOURCES
http://www.cio.com/article/2968281/cio-role/cios-vastly-underestimate-extent-of-shadow-it.html
http://www.claranet.co.uk/about-us/news/shadow-it-opportunity-innovate-suggests-claranet-research
http://www.techradar.com/news/internet/cloud-services/how-to-ensure-that-shadow-it-doesn-t-put-your-data-at-risk-in-2015-1283117
http://info.skyhighnetworks.com/WP-CARR-Q2-2015_Download_White.html?Source=website&LSource=website
http://www.computing.co.uk/ctg/news/2419409/cios-worried-cloud-computing-and-shadow-it-creating-security-risks
https://www.symantec.com/content/en/us/enterprise/other_resources/b-enterprise-security-in-the-cloud.en-us.pdf
https://www.elastica.net/q2-2015-shadow-data-report/
http://cdn2.hubspot.net/hubfs/349272/2016-Report-ShadowData-2H_2015/2H_2015_Shadow_Data_Report.pdf
http://www.channelweb.co.uk/crn-uk/news/2422814/attempts-to-curtail-shadow-it-futile-says-gartner
TAKEAWAYS
[Enjoy sharing]

More Related Content

What's hot

A Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible WorkforceA Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible WorkforceBMC_DSM
 
The Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information AgeThe Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information AgeElizabeth Lupfer
 
Collab365 Global Conference: 4 Trends in the Digital Workplace
Collab365 Global Conference: 4 Trends in the Digital WorkplaceCollab365 Global Conference: 4 Trends in the Digital Workplace
Collab365 Global Conference: 4 Trends in the Digital WorkplaceMartin Risgaard Rasmussen
 
Employee engagement-digital-workplace
Employee engagement-digital-workplaceEmployee engagement-digital-workplace
Employee engagement-digital-workplaceJane McConnell
 
Peer Into the Bright Future on the Service Desk Horizon
Peer Into the Bright Future on the Service Desk HorizonPeer Into the Bright Future on the Service Desk Horizon
Peer Into the Bright Future on the Service Desk HorizonBMC Software
 
The Digital Workplace at Grundfos From Content to Collaboration
The Digital Workplace at Grundfos  From Content to CollaborationThe Digital Workplace at Grundfos  From Content to Collaboration
The Digital Workplace at Grundfos From Content to CollaborationMartin Risgaard Rasmussen
 
The Perfect IT Couple: Service Management Meets Asset Management
The Perfect IT Couple: Service Management Meets Asset ManagementThe Perfect IT Couple: Service Management Meets Asset Management
The Perfect IT Couple: Service Management Meets Asset ManagementBMC_DSM
 
6 major trends of the digital workplace
6 major trends of the digital workplace6 major trends of the digital workplace
6 major trends of the digital workplaceLiveTiles
 
Digital Strategies for Employee Engagement
Digital Strategies for Employee EngagementDigital Strategies for Employee Engagement
Digital Strategies for Employee EngagementStephan Schillerwein
 
Digital Workplace Hype vs Reality
Digital Workplace   Hype vs RealityDigital Workplace   Hype vs Reality
Digital Workplace Hype vs RealityMarc Wright
 
The Busisness Case for Digital Workplace Projects
The Busisness Case for Digital Workplace ProjectsThe Busisness Case for Digital Workplace Projects
The Busisness Case for Digital Workplace ProjectsStephan Schillerwein
 
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)James Robertson
 
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...Dion Hinchcliffe
 
Digital Transformation for SMBs - A.Buschek
Digital Transformation for SMBs - A.BuschekDigital Transformation for SMBs - A.Buschek
Digital Transformation for SMBs - A.BuschekAlexander Buschek
 
Digital Workplace Evolution: ready for the next step?
Digital Workplace Evolution: ready for the next step?Digital Workplace Evolution: ready for the next step?
Digital Workplace Evolution: ready for the next step?Stephan Schillerwein
 
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...Digital Workplace Experience
 
It's time to create a digital workplace that empowers people
 It's time to create a digital workplace that empowers people It's time to create a digital workplace that empowers people
It's time to create a digital workplace that empowers peopleOscar Berg
 

What's hot (20)

A Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible WorkforceA Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible Workforce
 
The Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information AgeThe Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information Age
 
HR - Your role in creating a digital workplace
HR - Your role in creating a digital workplaceHR - Your role in creating a digital workplace
HR - Your role in creating a digital workplace
 
Collab365 Global Conference: 4 Trends in the Digital Workplace
Collab365 Global Conference: 4 Trends in the Digital WorkplaceCollab365 Global Conference: 4 Trends in the Digital Workplace
Collab365 Global Conference: 4 Trends in the Digital Workplace
 
The Digital Team Platform
The Digital Team PlatformThe Digital Team Platform
The Digital Team Platform
 
Employee engagement-digital-workplace
Employee engagement-digital-workplaceEmployee engagement-digital-workplace
Employee engagement-digital-workplace
 
Peer Into the Bright Future on the Service Desk Horizon
Peer Into the Bright Future on the Service Desk HorizonPeer Into the Bright Future on the Service Desk Horizon
Peer Into the Bright Future on the Service Desk Horizon
 
The Digital Workplace at Grundfos From Content to Collaboration
The Digital Workplace at Grundfos  From Content to CollaborationThe Digital Workplace at Grundfos  From Content to Collaboration
The Digital Workplace at Grundfos From Content to Collaboration
 
The Perfect IT Couple: Service Management Meets Asset Management
The Perfect IT Couple: Service Management Meets Asset ManagementThe Perfect IT Couple: Service Management Meets Asset Management
The Perfect IT Couple: Service Management Meets Asset Management
 
6 major trends of the digital workplace
6 major trends of the digital workplace6 major trends of the digital workplace
6 major trends of the digital workplace
 
Digital Strategies for Employee Engagement
Digital Strategies for Employee EngagementDigital Strategies for Employee Engagement
Digital Strategies for Employee Engagement
 
Digital Workplace Hype vs Reality
Digital Workplace   Hype vs RealityDigital Workplace   Hype vs Reality
Digital Workplace Hype vs Reality
 
The Busisness Case for Digital Workplace Projects
The Busisness Case for Digital Workplace ProjectsThe Busisness Case for Digital Workplace Projects
The Busisness Case for Digital Workplace Projects
 
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
 
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
 
Digital Transformation for SMBs - A.Buschek
Digital Transformation for SMBs - A.BuschekDigital Transformation for SMBs - A.Buschek
Digital Transformation for SMBs - A.Buschek
 
Digital Workplace Evolution: ready for the next step?
Digital Workplace Evolution: ready for the next step?Digital Workplace Evolution: ready for the next step?
Digital Workplace Evolution: ready for the next step?
 
Future Trends in the Digital Workplace
Future Trends in the Digital WorkplaceFuture Trends in the Digital Workplace
Future Trends in the Digital Workplace
 
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
 
It's time to create a digital workplace that empowers people
 It's time to create a digital workplace that empowers people It's time to create a digital workplace that empowers people
It's time to create a digital workplace that empowers people
 

Similar to How Is Your Data Shared? 10 Surprising Stats

Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
 
How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadArup Das
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdfLaLaBlaGhvgT
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeCapgemini
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportCensornet
 
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...openQRM Enterprise GmbH
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paperDavid Gould
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0PT Datacomm Diangraha
 
EMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudEMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudAi-Ling See
 
H 9B11E026 MICROSOFT’S GO-TO-MARKET STRATEG.docx
H 9B11E026    MICROSOFT’S GO-TO-MARKET STRATEG.docxH 9B11E026    MICROSOFT’S GO-TO-MARKET STRATEG.docx
H 9B11E026 MICROSOFT’S GO-TO-MARKET STRATEG.docxwhittemorelucilla
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...HCL Infosystems
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloudJan Wiersma
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksCloudMask inc.
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud worldMehdi Charafeddine
 
Bringing Shadow IT Into the Light
Bringing Shadow IT Into the LightBringing Shadow IT Into the Light
Bringing Shadow IT Into the LightJennifer Stern
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 

Similar to How Is Your Data Shared? 10 Surprising Stats (20)

Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 
How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLead
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
TierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_ReasonsTierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_Reasons
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business Report
 
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
EMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudEMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid Cloud
 
H 9B11E026 MICROSOFT’S GO-TO-MARKET STRATEG.docx
H 9B11E026    MICROSOFT’S GO-TO-MARKET STRATEG.docxH 9B11E026    MICROSOFT’S GO-TO-MARKET STRATEG.docx
H 9B11E026 MICROSOFT’S GO-TO-MARKET STRATEG.docx
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risks
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud world
 
Bringing Shadow IT Into the Light
Bringing Shadow IT Into the LightBringing Shadow IT Into the Light
Bringing Shadow IT Into the Light
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Internet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazineInternet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazine
 

More from The Cloud Communications division of NTT Ltd.

Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...The Cloud Communications division of NTT Ltd.
 
Собрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямСобрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямThe Cloud Communications division of NTT Ltd.
 

More from The Cloud Communications division of NTT Ltd. (20)

The Cloud Communications division of NTT Ltd.
The Cloud Communications division of NTT Ltd. The Cloud Communications division of NTT Ltd.
The Cloud Communications division of NTT Ltd.
 
Reuniões tão únicas quanto você
Reuniões tão únicas quanto vocêReuniões tão únicas quanto você
Reuniões tão únicas quanto você
 
Um dia na vida de um usuário do ArkadinVision
Um dia na vida de um usuário do ArkadinVisionUm dia na vida de um usuário do ArkadinVision
Um dia na vida de um usuário do ArkadinVision
 
Green and on-the-go: Actioning environmental prosperity through tech
Green and on-the-go: Actioning environmental prosperity through techGreen and on-the-go: Actioning environmental prosperity through tech
Green and on-the-go: Actioning environmental prosperity through tech
 
Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...
 
Собрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямСобрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностям
 
Tıpkı sizin kadar benzersiz toplantılar
Tıpkı sizin kadar benzersiz toplantılarTıpkı sizin kadar benzersiz toplantılar
Tıpkı sizin kadar benzersiz toplantılar
 
Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir GünBir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
 
Spotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak TySpotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak Ty
 
Dzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVisionDzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVision
 
Schůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vySchůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vy
 
Všední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVisionVšední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVision
 
How Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote WorkingHow Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote Working
 
10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style
 
7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity
 
Top 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaborationTop 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaboration
 
Arkadin Value Prop video
Arkadin Value Prop videoArkadin Value Prop video
Arkadin Value Prop video
 
Arkadin value prop Event
Arkadin value prop EventArkadin value prop Event
Arkadin value prop Event
 
Arkadin value prop Corporate
Arkadin value prop CorporateArkadin value prop Corporate
Arkadin value prop Corporate
 
Arkadin totalconnect microsoft-ebook_fr
Arkadin totalconnect microsoft-ebook_frArkadin totalconnect microsoft-ebook_fr
Arkadin totalconnect microsoft-ebook_fr
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

How Is Your Data Shared? 10 Surprising Stats

  • 1. How Is Your Data Shared? 10 Surprising Stats 10 STATISTICS THAT REVEAL THE RISKS TO SECURITY WHEN SHADOW I.T IS USED FOR DATA SHARING, ON A SCALE THAT I.T LEADERS ARE ONLY JUST BEGINNING TO GRASP. BOB DIMICCO, GLOBAL LEADER AND FOUNDER OF CISCO’S CLOUD CONSUMPTION SERVICE PRACTICE “IT has lost control here because organizations, lines of business are saying I can go to the web and get an application or a service within minutes and start being productive.” 74% Of European IT leaders say they have an incomplete understanding of their organisations: this must be reversed if they are to turn Shadow IT into a positive opportunity to meet internal and external data sharing needs. 1: 2: FALLING SHORT 88% Of cloud applications are not enterprise-ready. But this will not stop determined employees from using them if they can expect quick benefits and boost productivity – and you aren’t providing the right alternative. Put another way… 3: NON-COMPLIANT Of cloud services don’t meet existing compliance requirements. Their continued unchecked use is leaving a gaping hole in data security, even in the most regulated sectors. 7% 4: HEAD IN THE SAND? 89% Of UK CIOs don’t apply the same I.T service management processes to applications running in the public cloud as they do to internal applications – a head- in-the-sand approach which fails to account for the extent of Shadow I.T-enabled data sharing. 5: KNOWLEDGE GAP 37% Of CSOs suspect that individual users or business units regularly use applications or put data in the cloud without consulting IT. But why don’t they know for sure? ANARCHY RULES 31% Of organisations have no security policies, procedures or tools in place to specifically address the use of external cloud services. If end-users don’t know the rules, why should they give a second thought to data security when they are seizing the initiative and using Shadow I.T to get a task well done? 6: 7: FINANCIAL HIT $13.5 million The potential cost to a business of theft or compromised security when data is exposed in the cloud via storage service providers such as DropBox or Google Drive, including compliance-related fines. INTERNAL ASSUMPTIONS 70,000 8: The number of documents out of 2.5 million files, stored for internal use in Google Drive, which one media company discovered was publicly exposed during an audit. 9: SHARING AND CARING 26% 10% The volume of documents broadly shared by every individual user in the cloud, of which... Contain compliance-related data – an alarm call for every IT leader: Shadow IT applications are your responsibility, too! LICENCE TO SAVE $140 10: The amount of licence savings lost per person when a business lets its employees choose their own cloud services and applications. A well-conceived unified communications strategy could cut costs and reinforce data security. MATT CAIN, RESEARCH VICE PRESIDENT, GARTNER “Organisations that formally embrace and extend the digital competencies of their employees will experience improved business outcomes and gain competitive advantage.” IT’S EASY - AND DANGEROUS - TO IGNORE THE SCALE ON WHICH YOUR DATA IS PROBABLY BEING SHARED IN THE PUBLIC CLOUD. THE EXTENT TO WHICH YOUR PEOPLE ARE USING SHADOW IT SHOULD TELL YOU A LOT ABOUT WHAT THEY REALLY NEED TO HELP THEM SHARE DATA SECURELY. BY FAR THE MAJORITY OF CLOUD APPLICATIONS WOULD FAIL YOUR COMPLIANCE TEST - SO MAKE IT YOUR PRIORITY TO DISCOVER WHY PEOPLE ARE STILL USING THEM IN YOUR BUSINESS. SOURCES http://www.cio.com/article/2968281/cio-role/cios-vastly-underestimate-extent-of-shadow-it.html http://www.claranet.co.uk/about-us/news/shadow-it-opportunity-innovate-suggests-claranet-research http://www.techradar.com/news/internet/cloud-services/how-to-ensure-that-shadow-it-doesn-t-put-your-data-at-risk-in-2015-1283117 http://info.skyhighnetworks.com/WP-CARR-Q2-2015_Download_White.html?Source=website&LSource=website http://www.computing.co.uk/ctg/news/2419409/cios-worried-cloud-computing-and-shadow-it-creating-security-risks https://www.symantec.com/content/en/us/enterprise/other_resources/b-enterprise-security-in-the-cloud.en-us.pdf https://www.elastica.net/q2-2015-shadow-data-report/ http://cdn2.hubspot.net/hubfs/349272/2016-Report-ShadowData-2H_2015/2H_2015_Shadow_Data_Report.pdf http://www.channelweb.co.uk/crn-uk/news/2422814/attempts-to-curtail-shadow-it-futile-says-gartner TAKEAWAYS [Enjoy sharing]