July 25, 2016 By Patrick Wardrop 2 min read

Cloud is here to stay. Whether they realize it or not, businesses large and small have adopted cloud applications, and most companies have a growing concern about their cloud security posture.

Shadow IT: A Dark Cloud

Some cloud applications have a very simple enrollment process, which makes it easy for employees to sign up for the service without involving the IT department.

Shadow IT is what occurs when employees adopt cloud applications without approval or involvement from their IT department. It can be difficult to know what cloud applications have risk or threat exposures. If companies don’t provide a way for employees to understand what applications are allowed, shadow IT will continue.

Shadow IT can be discovered by using a cloud access security broker (CASB). CASBs are the future of cloud security. Unfortunately, most companies haven’t made the shift and are using static, outdated data to determine their risk exposure. They aren’t helping to coach employees to use low-risk, sanctioned cloud applications.

Training Goes a Long Way

Most shadow IT happens because employees are trying to do their jobs more efficiently and don’t know the risks of their actions. Coaching and training employees on the risks and pointing them to approved cloud applications will go a long way toward reducing risk and controlling shadow IT.

It is risky for companies to use outdated static data to determine the current or potential exposure for employees’ usage of unsanctioned or even sanctioned cloud applications. When enterprises hand over their corporate data to third parties, they should be sure that the cloud application provider is contractually obligated, prepared and equipped to handle that information.

Cloud Security Measures

To adopt cloud applications safely and prevent shadow IT, companies need to look for a CASB that not only discovers cloud applications, but also makes it easy for companies to connect with and teach employees about what is already approved. Additionally, the CASB should provide dynamic threat and risk data about the cloud applications being used.

More from Cloud Security

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

The importance of Infrastructure as Code (IaC) when Securing cloud environments

4 min read - According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they must also become increasingly aware of the security risks and threats that come with it. It’s not enough anymore to simply have a set of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today