SlideShare a Scribd company logo
1 of 1
Download to read offline
How Is Your
Data Shared?
10 Surprising Stats
10 STATISTICS THAT REVEAL THE RISKS TO SECURITY WHEN
SHADOW I.T IS USED FOR DATA SHARING, ON A SCALE THAT
I.T LEADERS ARE ONLY JUST BEGINNING TO GRASP.
BOB DIMICCO, GLOBAL LEADER AND FOUNDER OF CISCO’S
CLOUD CONSUMPTION SERVICE PRACTICE
“IT has lost control here
because organizations,
lines of business are saying
I can go to the web and get
an application or a service
within minutes and start
being productive.”
74%
Of European IT leaders say they have an incomplete
understanding of their organisations: this must be reversed if
they are to turn Shadow IT into a positive opportunity to meet
internal and external data sharing needs.
1:
2:
FALLING SHORT
88%
Of cloud applications are not enterprise-ready. But this will
not stop determined employees from using them if they can
expect quick benefits and boost productivity – and you aren’t
providing the right alternative.
Put another way…
3:
NON-COMPLIANT
Of cloud services don’t meet existing compliance requirements.
Their continued unchecked use is leaving a gaping hole in data
security, even in the most regulated sectors.
7%
4:
HEAD IN THE SAND?
89%
Of UK CIOs don’t apply the same I.T service
management processes to applications running in the
public cloud as they do to internal applications – a head-
in-the-sand approach which fails to account for the
extent of Shadow I.T-enabled data sharing.
5:
KNOWLEDGE GAP
37%
Of CSOs suspect that individual users or business units regularly use
applications or put data in the cloud without consulting IT. But why
don’t they know for sure?
ANARCHY RULES
31%
Of organisations have no security policies, procedures or tools in
place to specifically address the use of external cloud services. If
end-users don’t know the rules, why should they give a second
thought to data security when they are seizing the initiative and
using Shadow I.T to get a task well done?
6:
7:
FINANCIAL HIT
$13.5 million
The potential cost to a business of theft or compromised security
when data is exposed in the cloud via storage service providers
such as DropBox or Google Drive, including compliance-related
fines.
INTERNAL ASSUMPTIONS
70,000
8:
The number of documents out of 2.5 million files, stored
for internal use in Google Drive, which one media company
discovered was publicly exposed during an audit.
9:
SHARING AND CARING
26%
10%
The volume of documents broadly shared by every individual
user in the cloud, of which...
Contain compliance-related data – an alarm call for
every IT leader: Shadow IT applications are your
responsibility, too!
LICENCE TO SAVE
$140
10:
The amount of licence savings lost per person when a business lets
its employees choose their own cloud services and applications. A
well-conceived unified communications strategy could cut costs
and reinforce data security.
MATT CAIN, RESEARCH VICE PRESIDENT, GARTNER
“Organisations that formally
embrace and extend the digital
competencies of their employees
will experience improved
business outcomes and gain
competitive advantage.”
IT’S EASY - AND DANGEROUS - TO IGNORE THE SCALE ON WHICH YOUR
DATA IS PROBABLY BEING SHARED IN THE PUBLIC CLOUD.
THE EXTENT TO WHICH YOUR PEOPLE ARE USING SHADOW IT SHOULD
TELL YOU A LOT ABOUT WHAT THEY REALLY NEED TO HELP THEM SHARE
DATA SECURELY.
BY FAR THE MAJORITY OF CLOUD APPLICATIONS WOULD FAIL YOUR
COMPLIANCE TEST - SO MAKE IT YOUR PRIORITY TO DISCOVER WHY
PEOPLE ARE STILL USING THEM IN YOUR BUSINESS.
SOURCES
http://www.cio.com/article/2968281/cio-role/cios-vastly-underestimate-extent-of-shadow-it.html
http://www.claranet.co.uk/about-us/news/shadow-it-opportunity-innovate-suggests-claranet-research
http://www.techradar.com/news/internet/cloud-services/how-to-ensure-that-shadow-it-doesn-t-put-your-data-at-risk-in-2015-1283117
http://info.skyhighnetworks.com/WP-CARR-Q2-2015_Download_White.html?Source=website&LSource=website
http://www.computing.co.uk/ctg/news/2419409/cios-worried-cloud-computing-and-shadow-it-creating-security-risks
https://www.symantec.com/content/en/us/enterprise/other_resources/b-enterprise-security-in-the-cloud.en-us.pdf
https://www.elastica.net/q2-2015-shadow-data-report/
http://cdn2.hubspot.net/hubfs/349272/2016-Report-ShadowData-2H_2015/2H_2015_Shadow_Data_Report.pdf
http://www.channelweb.co.uk/crn-uk/news/2422814/attempts-to-curtail-shadow-it-futile-says-gartner
TAKEAWAYS
[Enjoy sharing]

More Related Content

What's hot

A Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible WorkforceA Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible WorkforceBMC_DSM
 
The Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information AgeThe Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information AgeElizabeth Lupfer
 
Collab365 Global Conference: 4 Trends in the Digital Workplace
Collab365 Global Conference: 4 Trends in the Digital WorkplaceCollab365 Global Conference: 4 Trends in the Digital Workplace
Collab365 Global Conference: 4 Trends in the Digital WorkplaceMartin Risgaard Rasmussen
 
Employee engagement-digital-workplace
Employee engagement-digital-workplaceEmployee engagement-digital-workplace
Employee engagement-digital-workplaceJane McConnell
 
Peer Into the Bright Future on the Service Desk Horizon
Peer Into the Bright Future on the Service Desk HorizonPeer Into the Bright Future on the Service Desk Horizon
Peer Into the Bright Future on the Service Desk HorizonBMC Software
 
The Digital Workplace at Grundfos From Content to Collaboration
The Digital Workplace at Grundfos  From Content to CollaborationThe Digital Workplace at Grundfos  From Content to Collaboration
The Digital Workplace at Grundfos From Content to CollaborationMartin Risgaard Rasmussen
 
The Perfect IT Couple: Service Management Meets Asset Management
The Perfect IT Couple: Service Management Meets Asset ManagementThe Perfect IT Couple: Service Management Meets Asset Management
The Perfect IT Couple: Service Management Meets Asset ManagementBMC_DSM
 
6 major trends of the digital workplace
6 major trends of the digital workplace6 major trends of the digital workplace
6 major trends of the digital workplaceLiveTiles
 
Digital Strategies for Employee Engagement
Digital Strategies for Employee EngagementDigital Strategies for Employee Engagement
Digital Strategies for Employee EngagementStephan Schillerwein
 
Digital Workplace Hype vs Reality
Digital Workplace   Hype vs RealityDigital Workplace   Hype vs Reality
Digital Workplace Hype vs RealityMarc Wright
 
The Busisness Case for Digital Workplace Projects
The Busisness Case for Digital Workplace ProjectsThe Busisness Case for Digital Workplace Projects
The Busisness Case for Digital Workplace ProjectsStephan Schillerwein
 
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)James Robertson
 
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...Dion Hinchcliffe
 
Digital Transformation for SMBs - A.Buschek
Digital Transformation for SMBs - A.BuschekDigital Transformation for SMBs - A.Buschek
Digital Transformation for SMBs - A.BuschekAlexander Buschek
 
Digital Workplace Evolution: ready for the next step?
Digital Workplace Evolution: ready for the next step?Digital Workplace Evolution: ready for the next step?
Digital Workplace Evolution: ready for the next step?Stephan Schillerwein
 
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...Digital Workplace Experience
 
It's time to create a digital workplace that empowers people
 It's time to create a digital workplace that empowers people It's time to create a digital workplace that empowers people
It's time to create a digital workplace that empowers peopleOscar Berg
 

What's hot (20)

A Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible WorkforceA Digital Workplace for the Flexible Workforce
A Digital Workplace for the Flexible Workforce
 
The Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information AgeThe Digital Workplace - Redefining Productivity in the Information Age
The Digital Workplace - Redefining Productivity in the Information Age
 
HR - Your role in creating a digital workplace
HR - Your role in creating a digital workplaceHR - Your role in creating a digital workplace
HR - Your role in creating a digital workplace
 
Collab365 Global Conference: 4 Trends in the Digital Workplace
Collab365 Global Conference: 4 Trends in the Digital WorkplaceCollab365 Global Conference: 4 Trends in the Digital Workplace
Collab365 Global Conference: 4 Trends in the Digital Workplace
 
The Digital Team Platform
The Digital Team PlatformThe Digital Team Platform
The Digital Team Platform
 
Employee engagement-digital-workplace
Employee engagement-digital-workplaceEmployee engagement-digital-workplace
Employee engagement-digital-workplace
 
Peer Into the Bright Future on the Service Desk Horizon
Peer Into the Bright Future on the Service Desk HorizonPeer Into the Bright Future on the Service Desk Horizon
Peer Into the Bright Future on the Service Desk Horizon
 
The Digital Workplace at Grundfos From Content to Collaboration
The Digital Workplace at Grundfos  From Content to CollaborationThe Digital Workplace at Grundfos  From Content to Collaboration
The Digital Workplace at Grundfos From Content to Collaboration
 
The Perfect IT Couple: Service Management Meets Asset Management
The Perfect IT Couple: Service Management Meets Asset ManagementThe Perfect IT Couple: Service Management Meets Asset Management
The Perfect IT Couple: Service Management Meets Asset Management
 
6 major trends of the digital workplace
6 major trends of the digital workplace6 major trends of the digital workplace
6 major trends of the digital workplace
 
Digital Strategies for Employee Engagement
Digital Strategies for Employee EngagementDigital Strategies for Employee Engagement
Digital Strategies for Employee Engagement
 
Digital Workplace Hype vs Reality
Digital Workplace   Hype vs RealityDigital Workplace   Hype vs Reality
Digital Workplace Hype vs Reality
 
The Busisness Case for Digital Workplace Projects
The Busisness Case for Digital Workplace ProjectsThe Busisness Case for Digital Workplace Projects
The Busisness Case for Digital Workplace Projects
 
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
DEX: the way ahead (keynote at IntraTeam Event in Copenhagen, March 2020)
 
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
Creating Effective Adoption of Social Tools with Design and Measurement | DW2...
 
Digital Transformation for SMBs - A.Buschek
Digital Transformation for SMBs - A.BuschekDigital Transformation for SMBs - A.Buschek
Digital Transformation for SMBs - A.Buschek
 
Digital Workplace Evolution: ready for the next step?
Digital Workplace Evolution: ready for the next step?Digital Workplace Evolution: ready for the next step?
Digital Workplace Evolution: ready for the next step?
 
Future Trends in the Digital Workplace
Future Trends in the Digital WorkplaceFuture Trends in the Digital Workplace
Future Trends in the Digital Workplace
 
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
Leveraging Digital Workspace Tools to Boost Productivity and Employee Engagem...
 
It's time to create a digital workplace that empowers people
 It's time to create a digital workplace that empowers people It's time to create a digital workplace that empowers people
It's time to create a digital workplace that empowers people
 

Similar to How Is Your Data Shared? 10 Surprising Stats

Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
 
How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadArup Das
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdfLaLaBlaGhvgT
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeCapgemini
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportCensornet
 
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...openQRM Enterprise GmbH
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paperDavid Gould
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0PT Datacomm Diangraha
 
EMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudEMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudAi-Ling See
 
H 9B11E026 MICROSOFT’S GO-TO-MARKET STRATEG.docx
H 9B11E026    MICROSOFT’S GO-TO-MARKET STRATEG.docxH 9B11E026    MICROSOFT’S GO-TO-MARKET STRATEG.docx
H 9B11E026 MICROSOFT’S GO-TO-MARKET STRATEG.docxwhittemorelucilla
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...HCL Infosystems
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloudJan Wiersma
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksCloudMask inc.
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud worldMehdi Charafeddine
 
Bringing Shadow IT Into the Light
Bringing Shadow IT Into the LightBringing Shadow IT Into the Light
Bringing Shadow IT Into the LightJennifer Stern
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 

Similar to How Is Your Data Shared? 10 Surprising Stats (20)

Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 
How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLead
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
TierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_ReasonsTierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_Reasons
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business Report
 
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
Welcome to the private cloud - Use openQRM to adopt concepts from the public ...
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
EMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudEMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid Cloud
 
H 9B11E026 MICROSOFT’S GO-TO-MARKET STRATEG.docx
H 9B11E026    MICROSOFT’S GO-TO-MARKET STRATEG.docxH 9B11E026    MICROSOFT’S GO-TO-MARKET STRATEG.docx
H 9B11E026 MICROSOFT’S GO-TO-MARKET STRATEG.docx
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risks
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud world
 
Bringing Shadow IT Into the Light
Bringing Shadow IT Into the LightBringing Shadow IT Into the Light
Bringing Shadow IT Into the Light
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Internet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazineInternet_of_Things_CEO_ magazine
Internet_of_Things_CEO_ magazine
 

More from The Cloud Communications division of NTT Ltd.

Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...The Cloud Communications division of NTT Ltd.
 
Собрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямСобрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямThe Cloud Communications division of NTT Ltd.
 

More from The Cloud Communications division of NTT Ltd. (20)

The Cloud Communications division of NTT Ltd.
The Cloud Communications division of NTT Ltd. The Cloud Communications division of NTT Ltd.
The Cloud Communications division of NTT Ltd.
 
Reuniões tão únicas quanto você
Reuniões tão únicas quanto vocêReuniões tão únicas quanto você
Reuniões tão únicas quanto você
 
Um dia na vida de um usuário do ArkadinVision
Um dia na vida de um usuário do ArkadinVisionUm dia na vida de um usuário do ArkadinVision
Um dia na vida de um usuário do ArkadinVision
 
Green and on-the-go: Actioning environmental prosperity through tech
Green and on-the-go: Actioning environmental prosperity through techGreen and on-the-go: Actioning environmental prosperity through tech
Green and on-the-go: Actioning environmental prosperity through tech
 
Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...
 
Собрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямСобрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностям
 
Tıpkı sizin kadar benzersiz toplantılar
Tıpkı sizin kadar benzersiz toplantılarTıpkı sizin kadar benzersiz toplantılar
Tıpkı sizin kadar benzersiz toplantılar
 
Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir GünBir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
 
Spotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak TySpotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak Ty
 
Dzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVisionDzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVision
 
Schůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vySchůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vy
 
Všední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVisionVšední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVision
 
How Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote WorkingHow Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote Working
 
10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style
 
7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity
 
Top 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaborationTop 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaboration
 
Arkadin Value Prop video
Arkadin Value Prop videoArkadin Value Prop video
Arkadin Value Prop video
 
Arkadin value prop Event
Arkadin value prop EventArkadin value prop Event
Arkadin value prop Event
 
Arkadin value prop Corporate
Arkadin value prop CorporateArkadin value prop Corporate
Arkadin value prop Corporate
 
Arkadin totalconnect microsoft-ebook_fr
Arkadin totalconnect microsoft-ebook_frArkadin totalconnect microsoft-ebook_fr
Arkadin totalconnect microsoft-ebook_fr
 

Recently uploaded

UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 

Recently uploaded (20)

UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 

How Is Your Data Shared? 10 Surprising Stats

  • 1. How Is Your Data Shared? 10 Surprising Stats 10 STATISTICS THAT REVEAL THE RISKS TO SECURITY WHEN SHADOW I.T IS USED FOR DATA SHARING, ON A SCALE THAT I.T LEADERS ARE ONLY JUST BEGINNING TO GRASP. BOB DIMICCO, GLOBAL LEADER AND FOUNDER OF CISCO’S CLOUD CONSUMPTION SERVICE PRACTICE “IT has lost control here because organizations, lines of business are saying I can go to the web and get an application or a service within minutes and start being productive.” 74% Of European IT leaders say they have an incomplete understanding of their organisations: this must be reversed if they are to turn Shadow IT into a positive opportunity to meet internal and external data sharing needs. 1: 2: FALLING SHORT 88% Of cloud applications are not enterprise-ready. But this will not stop determined employees from using them if they can expect quick benefits and boost productivity – and you aren’t providing the right alternative. Put another way… 3: NON-COMPLIANT Of cloud services don’t meet existing compliance requirements. Their continued unchecked use is leaving a gaping hole in data security, even in the most regulated sectors. 7% 4: HEAD IN THE SAND? 89% Of UK CIOs don’t apply the same I.T service management processes to applications running in the public cloud as they do to internal applications – a head- in-the-sand approach which fails to account for the extent of Shadow I.T-enabled data sharing. 5: KNOWLEDGE GAP 37% Of CSOs suspect that individual users or business units regularly use applications or put data in the cloud without consulting IT. But why don’t they know for sure? ANARCHY RULES 31% Of organisations have no security policies, procedures or tools in place to specifically address the use of external cloud services. If end-users don’t know the rules, why should they give a second thought to data security when they are seizing the initiative and using Shadow I.T to get a task well done? 6: 7: FINANCIAL HIT $13.5 million The potential cost to a business of theft or compromised security when data is exposed in the cloud via storage service providers such as DropBox or Google Drive, including compliance-related fines. INTERNAL ASSUMPTIONS 70,000 8: The number of documents out of 2.5 million files, stored for internal use in Google Drive, which one media company discovered was publicly exposed during an audit. 9: SHARING AND CARING 26% 10% The volume of documents broadly shared by every individual user in the cloud, of which... Contain compliance-related data – an alarm call for every IT leader: Shadow IT applications are your responsibility, too! LICENCE TO SAVE $140 10: The amount of licence savings lost per person when a business lets its employees choose their own cloud services and applications. A well-conceived unified communications strategy could cut costs and reinforce data security. MATT CAIN, RESEARCH VICE PRESIDENT, GARTNER “Organisations that formally embrace and extend the digital competencies of their employees will experience improved business outcomes and gain competitive advantage.” IT’S EASY - AND DANGEROUS - TO IGNORE THE SCALE ON WHICH YOUR DATA IS PROBABLY BEING SHARED IN THE PUBLIC CLOUD. THE EXTENT TO WHICH YOUR PEOPLE ARE USING SHADOW IT SHOULD TELL YOU A LOT ABOUT WHAT THEY REALLY NEED TO HELP THEM SHARE DATA SECURELY. BY FAR THE MAJORITY OF CLOUD APPLICATIONS WOULD FAIL YOUR COMPLIANCE TEST - SO MAKE IT YOUR PRIORITY TO DISCOVER WHY PEOPLE ARE STILL USING THEM IN YOUR BUSINESS. SOURCES http://www.cio.com/article/2968281/cio-role/cios-vastly-underestimate-extent-of-shadow-it.html http://www.claranet.co.uk/about-us/news/shadow-it-opportunity-innovate-suggests-claranet-research http://www.techradar.com/news/internet/cloud-services/how-to-ensure-that-shadow-it-doesn-t-put-your-data-at-risk-in-2015-1283117 http://info.skyhighnetworks.com/WP-CARR-Q2-2015_Download_White.html?Source=website&LSource=website http://www.computing.co.uk/ctg/news/2419409/cios-worried-cloud-computing-and-shadow-it-creating-security-risks https://www.symantec.com/content/en/us/enterprise/other_resources/b-enterprise-security-in-the-cloud.en-us.pdf https://www.elastica.net/q2-2015-shadow-data-report/ http://cdn2.hubspot.net/hubfs/349272/2016-Report-ShadowData-2H_2015/2H_2015_Shadow_Data_Report.pdf http://www.channelweb.co.uk/crn-uk/news/2422814/attempts-to-curtail-shadow-it-futile-says-gartner TAKEAWAYS [Enjoy sharing]