SHARE
Facebook X Pinterest WhatsApp

CIOs Are Concerned Over Employees’ Cloud Misuse

Apr 3, 2015

CIOs Are Concerned Over Employees’ Cloud Misuse

Concerns About Cloud SecurityConcerns About Cloud Security

90% of respondents are very or moderately concerned about public cloud security, which is delaying adoption of cloud computing. 47% of respondents were very concerned, 43% were moderately concerned, and 10% were either not at all concerned, or not sure.

Barriers to Cloud AdoptionBarriers to Cloud Adoption

The top five cloud security concerns are:, General security concerns: 45%, Data loss and leakage risks: 41%, Loss of control: 31%, Legal and regulatory compliance: 29%, Integration with existing IT environments: 29%

Security Threats in Public CloudsSecurity Threats in Public Clouds

The top five public cloud security threats are:, Unauthorized access: 63%, Hijacking of accounts, services or traffic: 61%, Malicious insiders: 43%, Insecure interfaces/APIs: 41%, Denial of service attacks: 39%

Personal Storage ConcernsPersonal Storage Concerns

80% of respondents are concerned about employees or visitors operating personal cloud storage services and the risk that poses regarding data privacy leakage. 43% of respondents said employees have access to personal storage services from their corporate network.

Consistent Security NeededConsistent Security Needed

According to respondents, the top key factors for client security are:, Consistent security with other IT infrastructure: 60%, Continuous protection: 58%, Affordability: 26%

Security Needs Moving to CloudSecurity Needs Moving to Cloud

When moving to the cloud, companies partnered with managed service providers the most (34%), security software followed (33%), added security staff dedicated to security issues (31%), and looked at security-as-a-service providers to outsource (27%).

Setting Cloud Security PoliciesSetting Cloud Security Policies

The top five preferred ways to improve cloud security are:, Setting and enforcing security policies across the cloud: 50%, APIs for reporting auditing and alerting on security events: 45%, Effective mapping of security controls for internally hosted applications to the cloud infrastructure: 41%, Isolation/protection of virtual machines: 39%, Ability to compare security levels across cloud providers: 38%

Encryption Remains KeyEncryption Remains Key

The majority of respondents believe data encryption is the most effective way to protect their data. The top five methods are: Data encryption: 65%, Network encryption: 57%, Access control: 48%, Intrusion detection and prevention: 48%, Security training: 45%

Perimeter Security Falls ShortPerimeter Security Falls Short

Perimeter-based security is not the whole answer to securing cloud infrastructure, according to 68% of the respondents. The remaining respondents think it is ineffective, or are not sure.

Recommended for you...

Taking the Complexity Out of the Cloud Journey
Drew Robb
Aug 25, 2022
What are Microservices?
Shelby Hiter
Apr 6, 2022
Edge Computing vs Cloud Computing: What are the Key Differences?
Aminu Abdullahi
Mar 19, 2022
Cloud Migration: What Are Key Strategies & Processes?
Don Hall
Dec 3, 2021
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.