Nasuni study: unauthorised file sharing, personal device usage remain risk factors

Organisations concerned about ongoing vulnerability management may be interested in the results of a recent study, which revealed an alarming lack of cyber security awareness amongst employees when it came to the safe storage of confidential information.

The report, prepared by enterprise storage management service providers Nasuni, was entitled Shadow IT in the Workplace, and looked at the ways in which staff members were utilising cloud storage and file sharing solutions.

It found that even when an organisation has a policy in place which workers are aware of and prevents the use of file sharing at work, half of employees will still admit to using these services.

The survey also found that BYOD and personal smart devices continue to be a risk factor in cyber security, as 58 per cent of employees who own a smart phone or tablet will readily access work related content via their portable device.

That number is only likely to grow as well, as Nasuni estimates the number of personal devices in the workplace will grow a full 25 per cent before the end of January 2013.

"Consumer file sharing services and mobile devices have introduced enterprise employees to a new world of powerful, easy to use capabilities," said chief executive officer of Nasuni Andres Rodriguez in a statement released December 3.

Mr Rodriguez claims that enterprise IT is "rapidly losing control of corporate data", something which is a "risky proposition" that "IT needs to be in front of, and not behind".

In order to arm yourself with knowledge regarding the cyber security of your organisation, it might be worthwhile considering undergoing a security audit evaluation in order to determine where risk factors may be presenting themselves.

Often digital threats and vulnerabilities can arise from unexpected places – like the unauthorised and unsafe sharing of work related content – so it is important to take the time to understand how your organisation can act to improve its own level of cyber security.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s