Cloud Security Challenges – Top 5 risks of BYOC and Best Practices

By Published February 9, 2017

According to analyst firm Forrester, cloud computing industry is expected to grow to $191 billion by 2020. There are myriad benefits of cloud computing; among them increased employee productivity, faster time to market and lower cost is few to name. Nevertheless, the security of data in the cloud is a primary concern holding back cloud adoption for IT departments. Additionally, employees are not waiting, they are joining the “BYOC” or “Bring Your Own Cloud” movement – bringing their cloud services at work.

What is shadow IT?

In the past few years, there has been accelerated growth in new apps that can help people be more efficient and productive. The forward-thinking perceived the benefits of BYOC and bring in the concept of “Shadow IT”.

Shadow IT is a term often used to describe IT systems and solutions built as well as used inside organisations without explicit organisational approval.

Top 5 risks of BYOC or Bring Your Own Cloud
Some of these perils are linked to weak cloud security measures of the services, such as multi-factor authentication to access the service, or storing data without controls such as encryption.

BYOC
Img. Src. Owning
1. Compliance Violations and Regulatory Actions

Nowadays, most organisations operate under some regulatory control of their information, including one of several other industries and government regulations. Under these mandates, companies must know: Who can access their data, where it is stored and how it is being protected.

( 21 visits)

Related posts: