How cloud services leave enterprises vulnerable to data theft
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
22302
post-template-default,single,single-post,postid-22302,single-format-standard,stockholm-core-2.4.5,select-child-theme-ver-1.0.0,select-theme-ver-9.12,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-7.9,vc_responsive

How cloud services leave enterprises vulnerable to data theft

ef25cf4a-8603-4ac9-9ede-40dba70691f9.jpg

Workers excessively sharing documents in the cloud is a security problem. IT needs to get more on top of it, a new report says.

Sourced through Scoop.it from: www.networkworld.com

ShadowIT is the result of users needing to fulfill their tasks under day to day pressure and stress and where the internal systems don’t support them.It doesn’t matter if you have installed the very best system and most advanced secure communication “rooms” if it’s too difficult to use or takes too long to set it up. If, for instance, the procurement department need to send specs to potential suppliers they cannot go through a week long process of having the IT department administrate setup, invites and user credentials. Not when the alternative is available in the cloud. And not when you are paid and measured on running multiple procurement projects in parallel.

The only security system worth anything is the one that gets used in real life. The rest is a waste of money and time.

See on Scoop.itSecure communication