sb-as logo
Story image

Data is dispersed in the cloud beyond most enterprise control - McAfee

McAfee recently released a new research study titled Enterprise Supernova: The Data Dispersion Cloud Adoption and Risk Report.

The results describe the broad distribution of data across devices and the cloud, highlighting critical gaps for enterprise security.

Key Findings:

  •  52% of companies use cloud services that have had user data stolen in a breach
     
  • One in four companies have had their sensitive data downloaded from the cloud to an unmanaged personal device, where they can’t see or control what happens to the data
     
  • Companies monitoring their cloud services with data loss prevention (DLP) see an average of 45,737 incidents each month, yet only 37 % have implemented DLP.
     

79% of companies surveyed store sensitive data in the public cloud. While these companies approve an average of 41 cloud services each, up 33% from last year, thousands of other services are used ad-hoc without vetting.

In addition, 52% of companies use cloud services that have had user data stolen in a breach.

By leaving significant gaps into the visibility of their data, organizations leave themselves open to loss of sensitive data and to regulatory non-compliance.

 Cloud services have replaced many business-critical applications formerly run as on-premises software, leading to a migration of sensitive data to the cloud.

Use of personal devices when accessing cloud services, the movement of data between cloud services, and the sprawl of high-risk cloud services drive new areas of risk for companies using the cloud.

For organizations to secure their data they need a thorough understanding of where their data is and how it is shared—especially with the rapid adoption of cloud services.

As part of this report, McAfee surveyed 1,000 enterprise organizations in 11 countries and investigated anonymized events from 30 million enterprise cloud users to gain a holistic view of modern data dispersion.

Also revealed in the report:

  • Shadow IT continues to expand enterprise risk: According to the study, 26% of files in the cloud contain sensitive data, an increase of 23% year-over-year.

    91% of cloud services do not encrypt data at rest; meaning data isn’t protected if the cloud provider is breached.

     
  • Personal devices are black holes: 79% of companies allow access to enterprise-approved cloud services from personal devices.

    One in four companies has had their sensitive data downloaded from the cloud to an unmanaged, personal device, where they can’t see or control what happens to the data.

     
  •  Intercloud travel opens new paths to risk: Collaboration facilitates the transfer of data within and between cloud services, creating a new challenge for data protection.

    49% of files that enter a cloud service are eventually shared. One in 10 files that contain sensitive data and are shared in the cloud use a publicly accessible link to the file, an increase of 111% year-over-year.

     
  • A new era of data protection is on the horizon: 93% of CISOs understand it’s their responsibility to secure data in the cloud.

    However, 30% of companies lack the staff with skills to secure their software-as-a-service applications, up 33% from last year.


Both technology and training are outpaced by the rapid expansion of the cloud.

“The force of the cloud is unstoppable, and the dispersion of data creates new opportunities for both growth and risk,” says McAfee senior vice president of cloud security Rajiv Gupta.

“Security that is data-centric, creating a spectrum of controls from the device, through the web, into the cloud, and within the cloud provides the opportunity to break the paradigm of yesterday’s network-centric protection that is not sufficient for today’s cloud-first needs.”

Story image
Device authentication services to reach $8.4 billion by 2026 in response to IoT cybersecurity
"There are several key technologies revolving around authentication security that currently transform the IoT device value chain."More
Download image
Crypto-of things replaces tokens as next generation of enterprise security
Forget hardware tokens (they’re high-maintenance), software tokens (they’re full of vulnerabilities) and one-time-password generators (often full of vulnerabilities and UX issues).More
Link image
Enterprises require a new approach to data-driven transformation
Organisations need a new approach. An enterprise data cloud unlocks the power of your data to serve customers better, operate with greater efficiency, and strengthen security to protect your businessMore
Story image
Oracle combines cloud automation with comms security in new solution
The Oracle Communications Security Shield (OCSS) Cloud is built on the company’s cloud infrastructure, and uses AI and real-time enforcement to combat the heightened risk of infrastructure attacks presented to contact centres and enterprises.More
Story image
LogMeIn report outlines identity management's role in creating business trust
More resources are funnelled into identity and access management (IAM) than any other IT security area.More
Story image
Illumio launches Zero Trust endpoint protection solution for our digital, remote world
“As organisations were forced to transform overnight to allow for remote work, a host of endpoint security issues that have either been ignored or invisible until now were brought to the forefront."More