Cisco recently unveiled its sixth annual Global Cloud Index (2015-2020), a report analyzing and projecting cloud traffic. The report projects that cloud traffic will nearly quadruple by 2020 as consumers and organizations alike migrate to cloud architecture in order to scale quickly and efficiently. Mirroring growth alongside the cloud is the expected increased use of mobile devices as the primary endpoint device for work, as well as a rise in connected “things,” as mobility becomes a central component of how we work.
Cisco estimates that by 2020, the amount of data stored on devices will be 5 times higher than data stored in data centres by 2020. Additionally, Cisco projects that 59% of the consumer Internet population (2.3 billion users) will use personal cloud storage, up from 47% in 2015. With 1 billion more users in the cloud, the figure this increase represents, that’s a whole lot more data in the cloud as well. And you can be sure that a hefty portion of this data is corporate data hiding in the ‘shadow.’
What’s important in analyzing the trends in the cloud is to recognize that consumer trends have a significant impact on enterprise data security. The cloud is currently responsible for an explosive growth in Shadow IT. The projected growth in costumer cloud use points at a likely surge in shadow data hiding in the cloud.
80% of employees admit to setting up cloud services without the approval of IT, so it’s no wonder that the average organization finds out Cloud use is actually 20x higher than they expected, on average about 841 Cloud apps per organization. According to a report from Sky-high, 18% of files in the cloud contain sensitive data and that 38.7% of total cloud services being used within the organization are consumer cloud services. The same report indicates that the average company experiences 23.2 cloud-based security incidents each month. As cybercriminals shift their attacks to the cloud, in recognition of the shift in data storage, it’s likely we’ll see an uptick in incidents associated with the cloud.
The storage of sensitive corporate data on unauthorized Cloud-based applications such as Dropbox, OneDrive, iCloud, and Box can lead to costly data breaches. With the use of consumer cloud storage expected to increase, you need a way to gain visibility into the cloud, whether it’s sanctioned or not. We’ve created that with Absolute DDS.
As we outlined in our post, How to Use Absolute DDS to Identify At-Risk Data in Cloud Applications, Absolute DDS gives you unprecedented visibility into your endpoints and the data they contain, even if that data is stored in cloud storage applications. Absolute DDS can identity devices with cloud storage software and detect devices with sensitive data (predefined by you), allowing you to proactively respond to the presence of at-risk data with remote data delete capabilities. Using custom alerts, you can enforce policies on which cloud applications are used and how, understanding that different users will have different permissions when it comes to data access.
To learn more, get started with your free evaluation version of Absolute DDS today.