ManagedMethods
  • Products
  • Free Trial
  • How It Works
    • Data Privacy
    • FAQs
  • Supported Apps
    • G Suite
    • Office 365
    • SaaS
  • Use Cases
    • Cyber Safety & Security
    • Data Security
    • Phishing & Malware Protection
    • Account Takeover Prevention
    • Student Self-Harm Detection
  • Customer Success Stories
  • Resources
    • Blog
    • Events & Webinars
    • Success Kits
    • More Resources
  • Company
    • In The News
    • Partners
    • Resellers
    • Careers
  • 1 (303) 415-3640
  • SUPPORT
  • CONTACT
  • Products Free Trial

    A Delicate Balance: Corporate Security vs. User Productivity

    July 7, 2016

    Recently, ARS Technica published a scathing article, “Clinton’s e-mail scandal another case of the entitled executive syndrome,” which focuses on Shadow IT as a matter of fact:

    “Often, people use Shadow IT at work because of a lack of official IT resources to support a need. But they also use Shadow IT for personal convenience—especially the personal convenience of executives and managers who want what they want and will twist the arm of someone in IT to support it whether it’s within policy or not (or find someone else to do it for them and then tell IT they have to support it).”

    The irony in this case and in others like it is that the people who extol the importance of digital security are often the ones who expect the most exceptions. We all understand why it’s important for everyone in an organization to err on the safer, more secure side of the road when it comes to digital workflows. There is plenty of data supporting how company insiders put information at risk:

    • 56% of respondents said that the primary cause of data breaches experienced by companies in this study was the careless employee.
    • In contrast, only 22% of respondents say external attackers or malicious/criminal insiders caused the breach.

    But when it comes to our own behavior, we tend to prioritize ease of use and productivity and downplay the risks. Employees, execs, and IT pros all have one thing in common: when it comes to Shadow IT, everyone else is the problem. I should know since I’m guilty of it myself!

    Here at ManagedMethods, we use a variety of sanctioned cloud apps, including Salesforce, which I use on a daily basis. However, I must admit that I also use a couple unsanctioned cloud apps:

    • Evernote to take quick notes during calls and create to-do lists
    • Google Apps to collaborate with my team

    Both these apps are free, easy to use and increase my productivity. My use of these apps is the very definition of Shadow IT!  

    But since we are a Cloud Security company, we practice what we preach: our IT team is able to monitor and control cloud app use, even unsanctioned apps, using our Cloud Access Monitor product. So they know I’m using Salesforce, Evernote and Google Apps, and even what type of data I’m sharing with those apps. That visibility and control is key to maintaining that delicate balance between risk and productivity.

    Written By: David Waugh

    Share this post

    CLOUD SECURITY INSIGHTS

    Get the latest cloud security insights delivered straight to your mailbox

    GET YOUR FREE TRIAL TODAY!

    Experience visibility and control with cloud security made easy. Start securing your organization’s cloud data!

    Start Your FREE Trial

    Categories

    • Account Takeover (2)
    • Cloud Access Security Broker (CASB) (35)
    • Cloud Risk Management (5)
    • Cloud Security (28)
    • Customer Success Stories (12)
    • Data Loss Prevention (11)
    • G Suite for Education Security (13)
    • Google Cloud Security (10)
    • Higher Ed Cloud Security (4)
    • In The News (107)
    • K-12 Cloud Risks (3)
    • K-12 Cloud Security (18)
    • K-12 Cyber Safety (9)
    • K-12 Cybersecurity (19)
    • K-12 Hybrid Learning Security (4)
    • K-12 Remote Learning (17)
    • Office 365 Cloud Security (7)
    • Product Updates (10)
    • SaaS Security (26)
    • Student Data Privacy (7)
    • The K-12 Tech Experience Podcast (2)

    Related Articles

    Aug 30, 2017 - SaaS Security

    Cloud Email: the obvious next step in cloud security

    Read More
    Jun 6, 2017 - SaaS Security

    Attention: IT has Moved to the Cloud. Why Hasn’t Security?

    Read More
    May 4, 2017 - SaaS Security

    Yesterday’s Google Docs Phishing Scheme: OAuth as an Attack Vector

    Read More
    • How It Works
    • Supported Apps
    • Use Cases
    • Partners
    • Resources
    • Company
    • Terms of Service
    • PRIVACY POLICY
    • Twitter
    • Linkedin
    • Youtube
    ©2020 ManagedMethods - Enfold WordPress Theme by Kriesi
    • Twitter
    • Linkedin
    • Youtube
    • Instagram
    • Facebook
    • How It Works
    • Supported Apps
    • Use Cases
    • Partners
    • Resources
    • Company
    • Terms of Service
    • PRIVACY POLICY
    My Take on Gartner’s Latest Information Security Forecasts It’s NOT Just a Flesh Wound: How Employee Actions Impact Corporate Se...
    Scroll to top