sb-as logo
Story image

Data is dispersed in the cloud beyond most enterprise control - McAfee

McAfee recently released a new research study titled Enterprise Supernova: The Data Dispersion Cloud Adoption and Risk Report.

The results describe the broad distribution of data across devices and the cloud, highlighting critical gaps for enterprise security.

Key Findings:

  •  52% of companies use cloud services that have had user data stolen in a breach
     
  • One in four companies have had their sensitive data downloaded from the cloud to an unmanaged personal device, where they can’t see or control what happens to the data
     
  • Companies monitoring their cloud services with data loss prevention (DLP) see an average of 45,737 incidents each month, yet only 37 % have implemented DLP.
     

79% of companies surveyed store sensitive data in the public cloud. While these companies approve an average of 41 cloud services each, up 33% from last year, thousands of other services are used ad-hoc without vetting.

In addition, 52% of companies use cloud services that have had user data stolen in a breach.

By leaving significant gaps into the visibility of their data, organizations leave themselves open to loss of sensitive data and to regulatory non-compliance.

 Cloud services have replaced many business-critical applications formerly run as on-premises software, leading to a migration of sensitive data to the cloud.

Use of personal devices when accessing cloud services, the movement of data between cloud services, and the sprawl of high-risk cloud services drive new areas of risk for companies using the cloud.

For organizations to secure their data they need a thorough understanding of where their data is and how it is shared—especially with the rapid adoption of cloud services.

As part of this report, McAfee surveyed 1,000 enterprise organizations in 11 countries and investigated anonymized events from 30 million enterprise cloud users to gain a holistic view of modern data dispersion.

Also revealed in the report:

  • Shadow IT continues to expand enterprise risk: According to the study, 26% of files in the cloud contain sensitive data, an increase of 23% year-over-year.

    91% of cloud services do not encrypt data at rest; meaning data isn’t protected if the cloud provider is breached.

     
  • Personal devices are black holes: 79% of companies allow access to enterprise-approved cloud services from personal devices.

    One in four companies has had their sensitive data downloaded from the cloud to an unmanaged, personal device, where they can’t see or control what happens to the data.

     
  •  Intercloud travel opens new paths to risk: Collaboration facilitates the transfer of data within and between cloud services, creating a new challenge for data protection.

    49% of files that enter a cloud service are eventually shared. One in 10 files that contain sensitive data and are shared in the cloud use a publicly accessible link to the file, an increase of 111% year-over-year.

     
  • A new era of data protection is on the horizon: 93% of CISOs understand it’s their responsibility to secure data in the cloud.

    However, 30% of companies lack the staff with skills to secure their software-as-a-service applications, up 33% from last year.


Both technology and training are outpaced by the rapid expansion of the cloud.

“The force of the cloud is unstoppable, and the dispersion of data creates new opportunities for both growth and risk,” says McAfee senior vice president of cloud security Rajiv Gupta.

“Security that is data-centric, creating a spectrum of controls from the device, through the web, into the cloud, and within the cloud provides the opportunity to break the paradigm of yesterday’s network-centric protection that is not sufficient for today’s cloud-first needs.”

Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More
Story image
Palo Alto Networks extends cloud native security platform with new modules
Palo Alto Networks has announced the availability of Prisma Cloud 2.0, including four new cloud security modules, thus extending its Cloud Native Security Platform (CNSP). More
Story image
Palo Alto Networks launches new SD-WAN solutions and enhancements
Palo Alto Networks has introduced two new SD-WAN appliances and enhancements to its next-generation SD-WAN solution, expanding the company’s CloudGenix SD-WAN solutions reach.More