CIOs Are Concerned Over Employees’ Cloud Misuse

Karen A. Frenkel Avatar

Updated on:

CIOs Are Concerned Over Employees’ Cloud Misuse

Concerns About Cloud SecurityConcerns About Cloud Security

90% of respondents are very or moderately concerned about public cloud security, which is delaying adoption of cloud computing. 47% of respondents were very concerned, 43% were moderately concerned, and 10% were either not at all concerned, or not sure.

Barriers to Cloud AdoptionBarriers to Cloud Adoption

The top five cloud security concerns are:, General security concerns: 45%, Data loss and leakage risks: 41%, Loss of control: 31%, Legal and regulatory compliance: 29%, Integration with existing IT environments: 29%

Security Threats in Public CloudsSecurity Threats in Public Clouds

The top five public cloud security threats are:, Unauthorized access: 63%, Hijacking of accounts, services or traffic: 61%, Malicious insiders: 43%, Insecure interfaces/APIs: 41%, Denial of service attacks: 39%

Personal Storage ConcernsPersonal Storage Concerns

80% of respondents are concerned about employees or visitors operating personal cloud storage services and the risk that poses regarding data privacy leakage. 43% of respondents said employees have access to personal storage services from their corporate network.

Consistent Security NeededConsistent Security Needed

According to respondents, the top key factors for client security are:, Consistent security with other IT infrastructure: 60%, Continuous protection: 58%, Affordability: 26%

Security Needs Moving to CloudSecurity Needs Moving to Cloud

When moving to the cloud, companies partnered with managed service providers the most (34%), security software followed (33%), added security staff dedicated to security issues (31%), and looked at security-as-a-service providers to outsource (27%).

Setting Cloud Security PoliciesSetting Cloud Security Policies

The top five preferred ways to improve cloud security are:, Setting and enforcing security policies across the cloud: 50%, APIs for reporting auditing and alerting on security events: 45%, Effective mapping of security controls for internally hosted applications to the cloud infrastructure: 41%, Isolation/protection of virtual machines: 39%, Ability to compare security levels across cloud providers: 38%

Encryption Remains KeyEncryption Remains Key

The majority of respondents believe data encryption is the most effective way to protect their data. The top five methods are: Data encryption: 65%, Network encryption: 57%, Access control: 48%, Intrusion detection and prevention: 48%, Security training: 45%

Perimeter Security Falls ShortPerimeter Security Falls Short

Perimeter-based security is not the whole answer to securing cloud infrastructure, according to 68% of the respondents. The remaining respondents think it is ineffective, or are not sure.

Karen A. Frenkel Avatar