SlideShare a Scribd company logo
1 of 11
Download to read offline
Decriminalize your Colleagues
How to address Shadow IT in the
enterprise
When an employee receives or shares a file through a high-risk
platform, are they committing a heinous security crime or
just doing their job?
The Box strategy for addressing Shadow IT in the
Enterprise doesn’t place the blame on employees.
How big is the file sharing universe?
The average company uses
49 file sharing services.
An increase of 104% since
2014 1
File sharing accounts for
39% of corporate data
uploaded to the cloud 2
1, 2 Skyhigh, Cloud Adoption Risk Report, Q1 2015
3 Skyhigh, Cloud Adoption Risk Report, Q1 2015
Is your confidential data protected?
22% of all files in the cloud
contain confidential data 4
37% of employees have uploaded at least
one file containing confidential data 5
4, 5 Skyhigh, The Definitive Guide to Cloud Security
Most file sharing services aren’t equipped
to encrypt confidential data
Only 26% have 256-bit
encryption or higher 7
Only 40% encrypt
data at rest 6
Less than 1% offer
customer managed
encryption keys 8
6-8 Skyhigh Cloud Adoption Risk Report
39% have identity
federation 10
21% offer multi-factor
authentication 9
Many services lack adequate identity and
authorization controls…
Only 50% provide
granular access controls 11
24% include IP filtering
support 12
9-12 Skyhigh Cloud Adoption Risk Report
… Or proper transparency and threat mitigation
Less than 44%
conduct pen-testing 14
Only 1% have
malware protection 15
59% have user activity
logging 16
29% have app security
measures (CSRF, SQLi,
XSS) 17
14-17 Skyhigh Cloud Adoption Risk Report
So, what’s an IT manager to do?
Four steps you can take to address Shadow IT
Assess
Identify your high-risk services, using network and expense audits
Analyze
Create a security checklist to identify secure tools and services
Secure
Select tools that meet those requirements, and train employees to
use them
Improve
Design a strategy for reviewing new applications and risks
Next, manage Shadow IT. Learn what you
need to make a file sharing service truly
secure:
Secure File Sharing Basics eBook

More Related Content

More from Luke Farrell

Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
 
Cybersecurity in the cognitive era: Priming your digital immune system
Cybersecurity in the cognitive era: Priming your digital immune systemCybersecurity in the cognitive era: Priming your digital immune system
Cybersecurity in the cognitive era: Priming your digital immune systemLuke Farrell
 
Six Reasons to Upgrade your Database
Six Reasons to Upgrade your DatabaseSix Reasons to Upgrade your Database
Six Reasons to Upgrade your DatabaseLuke Farrell
 
What's New in SPSS Statistics ?
What's New in SPSS Statistics ? What's New in SPSS Statistics ?
What's New in SPSS Statistics ? Luke Farrell
 
Manchester Police and ProActive Crime Prevention
Manchester Police and ProActive Crime PreventionManchester Police and ProActive Crime Prevention
Manchester Police and ProActive Crime PreventionLuke Farrell
 
What does data tell you about the customer journey?
What does data tell you about the customer journey?What does data tell you about the customer journey?
What does data tell you about the customer journey?Luke Farrell
 
Your Cognitive Future in the Retail Industry
Your Cognitive Future in the Retail IndustryYour Cognitive Future in the Retail Industry
Your Cognitive Future in the Retail IndustryLuke Farrell
 
Big Data at Big Blue
Big Data at Big BlueBig Data at Big Blue
Big Data at Big BlueLuke Farrell
 
Six Reasons to Upgrade your Database
Six Reasons to Upgrade your DatabaseSix Reasons to Upgrade your Database
Six Reasons to Upgrade your DatabaseLuke Farrell
 
Blackfriday 2015 The Results!
Blackfriday 2015 The Results!Blackfriday 2015 The Results!
Blackfriday 2015 The Results!Luke Farrell
 
Big data analytics infrastructure for dummies
Big data analytics infrastructure for dummiesBig data analytics infrastructure for dummies
Big data analytics infrastructure for dummiesLuke Farrell
 
A Guide to SPSS Statistics
A Guide to SPSS Statistics A Guide to SPSS Statistics
A Guide to SPSS Statistics Luke Farrell
 
IBM Sales Performance Management (SPM) for Dummies
IBM Sales Performance Management (SPM) for DummiesIBM Sales Performance Management (SPM) for Dummies
IBM Sales Performance Management (SPM) for DummiesLuke Farrell
 

More from Luke Farrell (15)

Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
Cybersecurity in the cognitive era: Priming your digital immune system
Cybersecurity in the cognitive era: Priming your digital immune systemCybersecurity in the cognitive era: Priming your digital immune system
Cybersecurity in the cognitive era: Priming your digital immune system
 
Six Reasons to Upgrade your Database
Six Reasons to Upgrade your DatabaseSix Reasons to Upgrade your Database
Six Reasons to Upgrade your Database
 
What's New in SPSS Statistics ?
What's New in SPSS Statistics ? What's New in SPSS Statistics ?
What's New in SPSS Statistics ?
 
Manchester Police and ProActive Crime Prevention
Manchester Police and ProActive Crime PreventionManchester Police and ProActive Crime Prevention
Manchester Police and ProActive Crime Prevention
 
IBM Dash DB
IBM Dash DBIBM Dash DB
IBM Dash DB
 
What does data tell you about the customer journey?
What does data tell you about the customer journey?What does data tell you about the customer journey?
What does data tell you about the customer journey?
 
Your Cognitive Future in the Retail Industry
Your Cognitive Future in the Retail IndustryYour Cognitive Future in the Retail Industry
Your Cognitive Future in the Retail Industry
 
Big Data at Big Blue
Big Data at Big BlueBig Data at Big Blue
Big Data at Big Blue
 
Six Reasons to Upgrade your Database
Six Reasons to Upgrade your DatabaseSix Reasons to Upgrade your Database
Six Reasons to Upgrade your Database
 
IBM Watson
IBM WatsonIBM Watson
IBM Watson
 
Blackfriday 2015 The Results!
Blackfriday 2015 The Results!Blackfriday 2015 The Results!
Blackfriday 2015 The Results!
 
Big data analytics infrastructure for dummies
Big data analytics infrastructure for dummiesBig data analytics infrastructure for dummies
Big data analytics infrastructure for dummies
 
A Guide to SPSS Statistics
A Guide to SPSS Statistics A Guide to SPSS Statistics
A Guide to SPSS Statistics
 
IBM Sales Performance Management (SPM) for Dummies
IBM Sales Performance Management (SPM) for DummiesIBM Sales Performance Management (SPM) for Dummies
IBM Sales Performance Management (SPM) for Dummies
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Decriminalize your colleagues: how to address shadow it in the enterprise

  • 1. Decriminalize your Colleagues How to address Shadow IT in the enterprise
  • 2. When an employee receives or shares a file through a high-risk platform, are they committing a heinous security crime or just doing their job? The Box strategy for addressing Shadow IT in the Enterprise doesn’t place the blame on employees.
  • 3. How big is the file sharing universe? The average company uses 49 file sharing services. An increase of 104% since 2014 1 File sharing accounts for 39% of corporate data uploaded to the cloud 2 1, 2 Skyhigh, Cloud Adoption Risk Report, Q1 2015
  • 4. 3 Skyhigh, Cloud Adoption Risk Report, Q1 2015
  • 5. Is your confidential data protected? 22% of all files in the cloud contain confidential data 4 37% of employees have uploaded at least one file containing confidential data 5 4, 5 Skyhigh, The Definitive Guide to Cloud Security
  • 6. Most file sharing services aren’t equipped to encrypt confidential data Only 26% have 256-bit encryption or higher 7 Only 40% encrypt data at rest 6 Less than 1% offer customer managed encryption keys 8 6-8 Skyhigh Cloud Adoption Risk Report
  • 7. 39% have identity federation 10 21% offer multi-factor authentication 9 Many services lack adequate identity and authorization controls… Only 50% provide granular access controls 11 24% include IP filtering support 12 9-12 Skyhigh Cloud Adoption Risk Report
  • 8. … Or proper transparency and threat mitigation Less than 44% conduct pen-testing 14 Only 1% have malware protection 15 59% have user activity logging 16 29% have app security measures (CSRF, SQLi, XSS) 17 14-17 Skyhigh Cloud Adoption Risk Report
  • 9. So, what’s an IT manager to do?
  • 10. Four steps you can take to address Shadow IT Assess Identify your high-risk services, using network and expense audits Analyze Create a security checklist to identify secure tools and services Secure Select tools that meet those requirements, and train employees to use them Improve Design a strategy for reviewing new applications and risks
  • 11. Next, manage Shadow IT. Learn what you need to make a file sharing service truly secure: Secure File Sharing Basics eBook