SHARE
Facebook X Pinterest WhatsApp

Risk Is IT’s Problem No Matter What

Jan 18, 2018

Risk Is IT’s Problem No Matter What

Risk Is IT's Problem No Matter WhatRisk Is IT’s Problem No Matter What

A survey says that risks created by departments beyond IT are still its responsibility, therefore, enterprises should focus on identity governance.

Failure to Understand Actions Creating RiskFailure to Understand Actions Creating Risk

55% of respondents said one key reason non-IT departments introduce the most risk is that they don’t understand what actions and behaviors result in risk.

Latest Applications Adopted Without Formal PoliciesLatest Applications Adopted Without Formal Policies

71% of organizations surveyed have embraced BYOD and SaaS, but less than half have implemented formal policies to protect corporate data.

Disconnect Between Policy And EnforcementDisconnect Between Policy And Enforcement

33% of respondents said their users do not follow policy and 72% of respondents are concerned about BYOD and shadow IT as exposure points.

Identity Governance Key to Managing RiskIdentity Governance Key to Managing Risk

71% of respondents said their organization’s data would be less exposed if they were better equipped to manage it. 71% of respondents whose organization has introduced identity governance solutions believe they will result in a more automated and efficient organization.

Hybrid IT Environments a RealityHybrid IT Environments a Reality

43% of respondents report having a “cloud first” strategy and 46% plan to implement one in the future.

Data Breaches Are the Cost of Doing BusinessData Breaches Are the Cost of Doing Business

60% of enterprises expect to be breached this year and 33% do not expect to know when that happens. On average, respondents admitted losses of $4 million as a result of a data breach in 2016.

Identity Is KeyIdentity Is Key

87% of respondents recognized the importance of having strong identity governance controls across the organization’s entire IT infrastructure.

Emerging Exposure PointsEmerging Exposure Points

Unstructured data (emails, files, documents, PDFs, etc.) resides outside applications and the structured corporate system, making it harder to manage. It is not always clear who has access to that data.

Hazards of Safeguarding Unstructured DataHazards of Safeguarding Unstructured Data

60% of respondents are concerned about managing and safeguarding sensitive data in such files and 70% believe they are not equipped to fully protect it.

Recommended for you...

Best Supply Chain Certifications to Get in 2022
Lauren Hansen
Aug 9, 2022
Best Social Media CRM Software 2022
Lauren Hansen
Apr 30, 2022
Benefits of ERP: Weighing the Pros and Cons
Shelby Hiter
Apr 22, 2022
How CIOs Can Support Retention During the Great Reshuffle: Interview with Carter Busse at Workato
Shelby Hiter
Apr 15, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.