SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
1(STILL) CARELESS USERS IN THE CLOUD
(Still)
Careless users
in the Cloud
2(STILL) CARELESS USERS IN THE CLOUD
Introduction
In 2014, cloud computing was still shifting into the enterprise mainstream. Tech-savvy employees were eager to adopt
cloud-based apps into their professional lives, breeding new challenges for IT departments.
Back then, Softchoice commissioned a study that discovered North American workers who use cloud apps displayed
markedly more reckless technology habits and were more likely to put their employers’ networks and corporate data at risk.
Two years later, most organizations have gone from flirting with the cloud to wholesale adoption, yet despite their new
level of cloud sophistication – not much has else changed! From lax password security to rogue IT behavior, North
American workers are (Still) Careless Users in the Cloud.
Methodology
Softchoice, a leading North American IT solutions and managed services provider, commissioned a study to understand people’s technology habits, and
how having access to cloud-based applications has affected that behavior. 1,500 people across the U.S. and Canada, who use technology for their full-
time job, were asked about their habits related to cloud application use, security, remote access, and device preferences, along with their perceptions of
and compliance with IT guidelines.
3(STILL) CARELESS USERS IN THE CLOUD
On average, North American employees use 2 devices for work.
While desktops are still common, more nimble devices are stealing workday share:
Devices used by employees for work
Laptop 61% Tablet 27% Smartphone 51% Phablet 6% Wearable 2%
Employee Profile: Devices
42% of tablet owners
prefer using it for work
over a desktop or laptop
16% of non-tablet
owners plan to get
one in the next year
14% of employees plan
on getting a wearable in
the next year
4(STILL) CARELESS USERS IN THE CLOUD
Employee Profile: Cloud Apps
Half of employees who use cloud-based apps for work
have access to 3 or more IT-approved apps.
Top reasons for using IT-approved cloud apps:
1. Specific job-related tasks
2. Collaboration with co-workers
3. File storage
4. Project management
5. Remote access
Top reasons for not using IT-approved apps:
1. Poor user experience
2. I don’t trust it’s secure
3. Not compatible with all devices
4. It lacks specific features I need for work
5. It’s too slow
x
5(STILL) CARELESS USERS IN THE CLOUD
Gaps in training and policy making
A significant number of employees are unaware of
the risks of their careless technology habits.
58% of all employees have
NOT been told the right way to
download and use cloud apps
44% of all employees
have NOT been told how to
securely transfer and store
private corporate data
39% of all employees have
NOT been told the risks of
downloading cloud apps
without IT’s knowledge
6(STILL) CARELESS USERS IN THE CLOUD
Employees behaving badly
1-in-5 keep passwords in plain sight, such as on a Post-It note
1-in-4 manage passwords in a doc that is not itself password protected
1-in-5 access work files from a device that is not password protected
1-in-5 lost employee devices is not password protected
1-in-3 cloud app users have downloaded one without letting IT know
7(STILL) CARELESS USERS IN THE CLOUD
Access to the cloud amplifies the risk of employees’ careless behavior.
Cloud app users are 2xmore likely to…
…than employees who don’t use cloud-based apps.
Careless users in the cloud
Keep passwords
on Post-It notes
Store passwords
on an unprotected
shared drive
Manage passwords
in an unprotected
document
Access work
files from an
unprotected device
Lose a device
with access
to work files
8(STILL) CARELESS USERS IN THE CLOUD
Access to cloud apps creating IT headaches
Employees who use cloud-based
apps are 10x more likely to shun
the IT approved program for an
unsanctioned one they download
themselves.
Employees who use cloud-based
apps are 4x more likely to access
work files outside the office
through a program IT doesn’t
know about.
23% of cloud app users claim
there is a popular app that a lot
of employees use that IT doesn’t
support (most popular: Dropbox
and Google Docs).
9(STILL) CARELESS USERS IN THE CLOUD
Shadow IT: Generation Breakdown
Younger app users are more likely to go rogue than their more senior
colleagues. Motivations for breaking the rules can also differ based on age.
								Motivation
Millennials and Gen Xers say IT is too slow to approve their choice.
Boomers say they didn’t know they had to notify IT at all.
Downloads apps without letting IT know:
31% Millennials
30% Gen X
22% Baby Boomers
10(STILL) CARELESS USERS IN THE CLOUD
Shadow IT: Generation Breakdown
Younger app users are more likely to go rogue than their more senior
colleagues. Motivations for breaking the rules can also differ based on age.
								Motivation
Millennials say IT’s version doesn’t improve productivity, Gen Xers
blame compatibility across devices, and Boomers say IT’s version
offers a poor user experience.
Downloads unsanctioned apps when IT offers an approved version:
23% Millennials
26% Gen X
13% Baby Boomers
11(STILL) CARELESS USERS IN THE CLOUD
Shadow IT: Generation Breakdown
Younger app users are more likely to go rogue than their more senior
colleagues. Motivations for breaking the rules can also differ based on age.
Accesses work files through an app IT doesn’t know about:
30% Millennials
27% Gen X
12% Baby Boomers
12(STILL) CARELESS USERS IN THE CLOUD
R-E-S-P-E-C-T employees have it for I-T
While employees don’t always follow the rules,
most believe their IT department is doing a good job.
71% say IT works proactively to understand their business needs.
67% say IT provides an optimal level of tech support.
Overall, cloud app users have a sunnier view of their IT teams
(over non-users), as do Canadians (over Americans).
“IT provides an optimal level of support.”
75% (app users) vs. 55% non-app users 81% (all Canadians) vs. 60% (all Americans)
13(STILL) CARELESS USERS IN THE CLOUD
Sorry, not sorry, eh?
Despite being more satisfied with their IT departments, Canadian cloud users are
more likely to disobey IT than their American counterparts.
“I downloaded an app without IT’s permission.”
33% vs. 24%
“IT takes too long to approve things.”
46% vs. 22%
“I downloaded an app even though IT offers a similar one.”
33% vs. 12%
“I remotely access files via an unsanctioned app.”
39% vs. 12%
“I access files from a device with no password.”
39% vs. 18%
“I display passwords on Post-It notes.”
41% vs. 13%
14(STILL) CARELESS USERS IN THE CLOUD
Recommendation: Prioritize training and communication
Risky behavior and data vulnerabilities are almost guaranteed to persist without
adequate education on the apps, platforms and IT tools employees use. Training –
bolstered by regular communications and resources to reinforce the do’s and don’ts –
will help employees to correct their bad user behavior, help them see the benefits of
using the tools IT provides, and help them to understand the risks of shadow IT and
why certain popular consumer apps don’t belong in the workplace.
15(STILL) CARELESS USERS IN THE CLOUD
Recommendation: Address careless behavior at the source
While employees gain a better understanding of IT through training and
communications, IT also needs to better understand employee behaviors and
preferences. They should assess what unsanctioned apps are being used in the
organization’s environment and engage employees to identify the reasons why they
stray from using sanctioned apps and IT-approved procurement processes. They can
use shadow IT as a means to get closer to users, and be seen as a business enabler,
by providing employees with a choice of enterprise-grade app options that meet
employee needs around productivity, compatibility, and user experience.
16(STILL) CARELESS USERS IN THE CLOUD
Recommendation: Manage the sprawl of apps and connected devices
The number and variety of devices that employees use for work is on the rise. IT
can take the hardware out of the equation by standardizing the ‘safe list’ of vetted
apps on an identity management platform, as part of a broader Enterprise Mobility
Management strategy. Employees can then access all of their apps in one location,
using a single password. IT can consolidate cloud spend, monitor app use, and
provision and deprovision users all from a single pane of glass – minimizing risk to
the organization, while providing a user-friendly environment for all employees.
17(STILL) CARELESS USERS IN THE CLOUD
Ready to put an end to careless cloud use?
Contact us today to learn more about how Softchoice
makes it easier to source, implement and manage the
right cloud solutions for your organization.
Softchoice.com
1-800-268-7638
|

Mais conteúdo relacionado

Mais procurados

SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds
 
5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take offTom Mellish
 
New IT Survey: Australia
New IT Survey: AustraliaNew IT Survey: Australia
New IT Survey: AustraliaSolarWinds
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public SectorSolarWinds
 
Small Business Survey Report
Small Business Survey ReportSmall Business Survey Report
Small Business Survey ReportChris Crum
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At WorkBlueboxer2014
 
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business? Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business? IBM Social Business
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSolarWinds
 
Top Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration SolutionsTop Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration SolutionsIBM Social Business
 
New IT Survey: UK
New IT Survey: UKNew IT Survey: UK
New IT Survey: UKSolarWinds
 
IFS Says Excel Runs Production
IFS Says Excel Runs ProductionIFS Says Excel Runs Production
IFS Says Excel Runs Productioncharlesrathmann
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
VMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing MobilityVMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing MobilityVMware
 
The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...RES
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Disruptive Technology
Disruptive TechnologyDisruptive Technology
Disruptive TechnologyRSutphin
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsVishal Shah
 
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...QuickBase, Inc.
 
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013MassTLC
 

Mais procurados (20)

SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
 
5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off
 
New IT Survey: Australia
New IT Survey: AustraliaNew IT Survey: Australia
New IT Survey: Australia
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public Sector
 
Small Business Survey Report
Small Business Survey ReportSmall Business Survey Report
Small Business Survey Report
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At Work
 
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business? Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
Shadow IT: Is Unauthorized Software the Biggest Threat to your Business?
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management Solutions
 
Top Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration SolutionsTop Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration Solutions
 
New IT Survey: UK
New IT Survey: UKNew IT Survey: UK
New IT Survey: UK
 
IFS Says Excel Runs Production
IFS Says Excel Runs ProductionIFS Says Excel Runs Production
IFS Says Excel Runs Production
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
VMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing MobilityVMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing Mobility
 
Bridge the Gap Between IT and Staff
Bridge the Gap Between IT and StaffBridge the Gap Between IT and Staff
Bridge the Gap Between IT and Staff
 
The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Disruptive Technology
Disruptive TechnologyDisruptive Technology
Disruptive Technology
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En Us
 
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
Intuit QuickBase at MassTLC Cloud Summit - Drivers of Cloud Adoption with All...
 
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
Allison Mnookin, Intuit presents at MassTLC Cloud Summit 2013
 

Destaque

Softchoice: 4 Ways IT Can Respond to a SaaS Outbreak
Softchoice: 4 Ways IT Can Respond to a SaaS OutbreakSoftchoice: 4 Ways IT Can Respond to a SaaS Outbreak
Softchoice: 4 Ways IT Can Respond to a SaaS OutbreakSoftchoice Corporation
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Corporation
 
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarEffective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarSoftchoice Corporation
 
Advantage India: A Study of Competitive Position of Organized Retail Industry
Advantage India: A Study of Competitive Position of Organized Retail IndustryAdvantage India: A Study of Competitive Position of Organized Retail Industry
Advantage India: A Study of Competitive Position of Organized Retail IndustryIOSR Journals
 
Everything you need to know about SQL Server 2016
Everything you need to know about SQL Server 2016Everything you need to know about SQL Server 2016
Everything you need to know about SQL Server 2016Softchoice Corporation
 
Case study of Competitive advantage at Dell Inc
Case study of  Competitive advantage at Dell IncCase study of  Competitive advantage at Dell Inc
Case study of Competitive advantage at Dell IncMehvish Rehman
 
Pourquoi les solutions de collaboration déçoivent parfois les attentes
Pourquoi les solutions de collaboration déçoivent parfois les attentesPourquoi les solutions de collaboration déçoivent parfois les attentes
Pourquoi les solutions de collaboration déçoivent parfois les attentesSoftchoice Corporation
 
Imprudences dans le nuage informatique (un constat et les moyens d’y remédier)
Imprudences dans le nuage informatique (un constat et les moyens d’y remédier)Imprudences dans le nuage informatique (un constat et les moyens d’y remédier)
Imprudences dans le nuage informatique (un constat et les moyens d’y remédier)Softchoice Corporation
 

Destaque (10)

Azure cloud governance deck
Azure cloud governance deckAzure cloud governance deck
Azure cloud governance deck
 
Softchoice: 4 Ways IT Can Respond to a SaaS Outbreak
Softchoice: 4 Ways IT Can Respond to a SaaS OutbreakSoftchoice: 4 Ways IT Can Respond to a SaaS Outbreak
Softchoice: 4 Ways IT Can Respond to a SaaS Outbreak
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
 
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarEffective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) Webinar
 
Advantage India: A Study of Competitive Position of Organized Retail Industry
Advantage India: A Study of Competitive Position of Organized Retail IndustryAdvantage India: A Study of Competitive Position of Organized Retail Industry
Advantage India: A Study of Competitive Position of Organized Retail Industry
 
Everything you need to know about SQL Server 2016
Everything you need to know about SQL Server 2016Everything you need to know about SQL Server 2016
Everything you need to know about SQL Server 2016
 
Case study of Competitive advantage at Dell Inc
Case study of  Competitive advantage at Dell IncCase study of  Competitive advantage at Dell Inc
Case study of Competitive advantage at Dell Inc
 
Pourquoi les solutions de collaboration déçoivent parfois les attentes
Pourquoi les solutions de collaboration déçoivent parfois les attentesPourquoi les solutions de collaboration déçoivent parfois les attentes
Pourquoi les solutions de collaboration déçoivent parfois les attentes
 
Trop occupé ou déconnecté?
Trop occupé ou déconnecté?Trop occupé ou déconnecté?
Trop occupé ou déconnecté?
 
Imprudences dans le nuage informatique (un constat et les moyens d’y remédier)
Imprudences dans le nuage informatique (un constat et les moyens d’y remédier)Imprudences dans le nuage informatique (un constat et les moyens d’y remédier)
Imprudences dans le nuage informatique (un constat et les moyens d’y remédier)
 

Semelhante a Still Careless Users In The Cloud - Research Study

Bringing Shadow IT Into the Light
Bringing Shadow IT Into the LightBringing Shadow IT Into the Light
Bringing Shadow IT Into the LightJennifer Stern
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceBlueboxer2014
 
Cloud Native Development
Cloud Native DevelopmentCloud Native Development
Cloud Native DevelopmentLCDF
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidencePaul Richards
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceKeith Purves
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app controlAneel Mitra
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015Skyhigh Networks
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc erasolarisyourep
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 
Cloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de UglyCloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de UglyMiguel Garcia
 
Cloud for Business Managers
Cloud for Business ManagersCloud for Business Managers
Cloud for Business ManagersMiguel Garcia
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesLeMeniz Infotech
 

Semelhante a Still Careless Users In The Cloud - Research Study (20)

Bringing Shadow IT Into the Light
Bringing Shadow IT Into the LightBringing Shadow IT Into the Light
Bringing Shadow IT Into the Light
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
Cloud Native Development
Cloud Native DevelopmentCloud Native Development
Cloud Native Development
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc era
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
Cloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de UglyCloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de Ugly
 
Cloud for Business Managers
Cloud for Business ManagersCloud for Business Managers
Cloud for Business Managers
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 

Mais de Softchoice Corporation

Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingSoftchoice Corporation
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingSoftchoice Corporation
 
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...Softchoice Corporation
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoverySoftchoice Corporation
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en actionSoftchoice Corporation
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice Corporation
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Softchoice Corporation
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice Corporation
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With AzureSoftchoice Corporation
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice Corporation
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Corporation
 
From Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsFrom Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsSoftchoice Corporation
 
Softchoice Innovation Executive Forum 2015 - Seattle
Softchoice Innovation Executive Forum 2015 - SeattleSoftchoice Innovation Executive Forum 2015 - Seattle
Softchoice Innovation Executive Forum 2015 - SeattleSoftchoice Corporation
 
Softchoice Innovation Executive Forum - Orlando 2015
Softchoice Innovation Executive Forum - Orlando 2015Softchoice Innovation Executive Forum - Orlando 2015
Softchoice Innovation Executive Forum - Orlando 2015Softchoice Corporation
 
Softchoice: Why UC Projects Fail (and what to do about it)
Softchoice: Why UC Projects Fail (and what to do about it)Softchoice: Why UC Projects Fail (and what to do about it)
Softchoice: Why UC Projects Fail (and what to do about it)Softchoice Corporation
 

Mais de Softchoice Corporation (20)

Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
 
Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern Licensing
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern Licensing
 
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recovery
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en action
 
Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuage
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost Governance
 
THE ECONOMICS OF AZURE MANAGEMENT
THE ECONOMICS OF AZURE MANAGEMENTTHE ECONOMICS OF AZURE MANAGEMENT
THE ECONOMICS OF AZURE MANAGEMENT
 
From Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsFrom Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster Proportions
 
Softchoice Innovation Executive Forum 2015 - Seattle
Softchoice Innovation Executive Forum 2015 - SeattleSoftchoice Innovation Executive Forum 2015 - Seattle
Softchoice Innovation Executive Forum 2015 - Seattle
 
Softchoice Innovation Executive Forum - Orlando 2015
Softchoice Innovation Executive Forum - Orlando 2015Softchoice Innovation Executive Forum - Orlando 2015
Softchoice Innovation Executive Forum - Orlando 2015
 
Softchoice Web Infrastructure Report
Softchoice Web Infrastructure ReportSoftchoice Web Infrastructure Report
Softchoice Web Infrastructure Report
 
Softchoice: Why UC Projects Fail (and what to do about it)
Softchoice: Why UC Projects Fail (and what to do about it)Softchoice: Why UC Projects Fail (and what to do about it)
Softchoice: Why UC Projects Fail (and what to do about it)
 

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Still Careless Users In The Cloud - Research Study

  • 1. 1(STILL) CARELESS USERS IN THE CLOUD (Still) Careless users in the Cloud
  • 2. 2(STILL) CARELESS USERS IN THE CLOUD Introduction In 2014, cloud computing was still shifting into the enterprise mainstream. Tech-savvy employees were eager to adopt cloud-based apps into their professional lives, breeding new challenges for IT departments. Back then, Softchoice commissioned a study that discovered North American workers who use cloud apps displayed markedly more reckless technology habits and were more likely to put their employers’ networks and corporate data at risk. Two years later, most organizations have gone from flirting with the cloud to wholesale adoption, yet despite their new level of cloud sophistication – not much has else changed! From lax password security to rogue IT behavior, North American workers are (Still) Careless Users in the Cloud. Methodology Softchoice, a leading North American IT solutions and managed services provider, commissioned a study to understand people’s technology habits, and how having access to cloud-based applications has affected that behavior. 1,500 people across the U.S. and Canada, who use technology for their full- time job, were asked about their habits related to cloud application use, security, remote access, and device preferences, along with their perceptions of and compliance with IT guidelines.
  • 3. 3(STILL) CARELESS USERS IN THE CLOUD On average, North American employees use 2 devices for work. While desktops are still common, more nimble devices are stealing workday share: Devices used by employees for work Laptop 61% Tablet 27% Smartphone 51% Phablet 6% Wearable 2% Employee Profile: Devices 42% of tablet owners prefer using it for work over a desktop or laptop 16% of non-tablet owners plan to get one in the next year 14% of employees plan on getting a wearable in the next year
  • 4. 4(STILL) CARELESS USERS IN THE CLOUD Employee Profile: Cloud Apps Half of employees who use cloud-based apps for work have access to 3 or more IT-approved apps. Top reasons for using IT-approved cloud apps: 1. Specific job-related tasks 2. Collaboration with co-workers 3. File storage 4. Project management 5. Remote access Top reasons for not using IT-approved apps: 1. Poor user experience 2. I don’t trust it’s secure 3. Not compatible with all devices 4. It lacks specific features I need for work 5. It’s too slow x
  • 5. 5(STILL) CARELESS USERS IN THE CLOUD Gaps in training and policy making A significant number of employees are unaware of the risks of their careless technology habits. 58% of all employees have NOT been told the right way to download and use cloud apps 44% of all employees have NOT been told how to securely transfer and store private corporate data 39% of all employees have NOT been told the risks of downloading cloud apps without IT’s knowledge
  • 6. 6(STILL) CARELESS USERS IN THE CLOUD Employees behaving badly 1-in-5 keep passwords in plain sight, such as on a Post-It note 1-in-4 manage passwords in a doc that is not itself password protected 1-in-5 access work files from a device that is not password protected 1-in-5 lost employee devices is not password protected 1-in-3 cloud app users have downloaded one without letting IT know
  • 7. 7(STILL) CARELESS USERS IN THE CLOUD Access to the cloud amplifies the risk of employees’ careless behavior. Cloud app users are 2xmore likely to… …than employees who don’t use cloud-based apps. Careless users in the cloud Keep passwords on Post-It notes Store passwords on an unprotected shared drive Manage passwords in an unprotected document Access work files from an unprotected device Lose a device with access to work files
  • 8. 8(STILL) CARELESS USERS IN THE CLOUD Access to cloud apps creating IT headaches Employees who use cloud-based apps are 10x more likely to shun the IT approved program for an unsanctioned one they download themselves. Employees who use cloud-based apps are 4x more likely to access work files outside the office through a program IT doesn’t know about. 23% of cloud app users claim there is a popular app that a lot of employees use that IT doesn’t support (most popular: Dropbox and Google Docs).
  • 9. 9(STILL) CARELESS USERS IN THE CLOUD Shadow IT: Generation Breakdown Younger app users are more likely to go rogue than their more senior colleagues. Motivations for breaking the rules can also differ based on age. Motivation Millennials and Gen Xers say IT is too slow to approve their choice. Boomers say they didn’t know they had to notify IT at all. Downloads apps without letting IT know: 31% Millennials 30% Gen X 22% Baby Boomers
  • 10. 10(STILL) CARELESS USERS IN THE CLOUD Shadow IT: Generation Breakdown Younger app users are more likely to go rogue than their more senior colleagues. Motivations for breaking the rules can also differ based on age. Motivation Millennials say IT’s version doesn’t improve productivity, Gen Xers blame compatibility across devices, and Boomers say IT’s version offers a poor user experience. Downloads unsanctioned apps when IT offers an approved version: 23% Millennials 26% Gen X 13% Baby Boomers
  • 11. 11(STILL) CARELESS USERS IN THE CLOUD Shadow IT: Generation Breakdown Younger app users are more likely to go rogue than their more senior colleagues. Motivations for breaking the rules can also differ based on age. Accesses work files through an app IT doesn’t know about: 30% Millennials 27% Gen X 12% Baby Boomers
  • 12. 12(STILL) CARELESS USERS IN THE CLOUD R-E-S-P-E-C-T employees have it for I-T While employees don’t always follow the rules, most believe their IT department is doing a good job. 71% say IT works proactively to understand their business needs. 67% say IT provides an optimal level of tech support. Overall, cloud app users have a sunnier view of their IT teams (over non-users), as do Canadians (over Americans). “IT provides an optimal level of support.” 75% (app users) vs. 55% non-app users 81% (all Canadians) vs. 60% (all Americans)
  • 13. 13(STILL) CARELESS USERS IN THE CLOUD Sorry, not sorry, eh? Despite being more satisfied with their IT departments, Canadian cloud users are more likely to disobey IT than their American counterparts. “I downloaded an app without IT’s permission.” 33% vs. 24% “IT takes too long to approve things.” 46% vs. 22% “I downloaded an app even though IT offers a similar one.” 33% vs. 12% “I remotely access files via an unsanctioned app.” 39% vs. 12% “I access files from a device with no password.” 39% vs. 18% “I display passwords on Post-It notes.” 41% vs. 13%
  • 14. 14(STILL) CARELESS USERS IN THE CLOUD Recommendation: Prioritize training and communication Risky behavior and data vulnerabilities are almost guaranteed to persist without adequate education on the apps, platforms and IT tools employees use. Training – bolstered by regular communications and resources to reinforce the do’s and don’ts – will help employees to correct their bad user behavior, help them see the benefits of using the tools IT provides, and help them to understand the risks of shadow IT and why certain popular consumer apps don’t belong in the workplace.
  • 15. 15(STILL) CARELESS USERS IN THE CLOUD Recommendation: Address careless behavior at the source While employees gain a better understanding of IT through training and communications, IT also needs to better understand employee behaviors and preferences. They should assess what unsanctioned apps are being used in the organization’s environment and engage employees to identify the reasons why they stray from using sanctioned apps and IT-approved procurement processes. They can use shadow IT as a means to get closer to users, and be seen as a business enabler, by providing employees with a choice of enterprise-grade app options that meet employee needs around productivity, compatibility, and user experience.
  • 16. 16(STILL) CARELESS USERS IN THE CLOUD Recommendation: Manage the sprawl of apps and connected devices The number and variety of devices that employees use for work is on the rise. IT can take the hardware out of the equation by standardizing the ‘safe list’ of vetted apps on an identity management platform, as part of a broader Enterprise Mobility Management strategy. Employees can then access all of their apps in one location, using a single password. IT can consolidate cloud spend, monitor app use, and provision and deprovision users all from a single pane of glass – minimizing risk to the organization, while providing a user-friendly environment for all employees.
  • 17. 17(STILL) CARELESS USERS IN THE CLOUD Ready to put an end to careless cloud use? Contact us today to learn more about how Softchoice makes it easier to source, implement and manage the right cloud solutions for your organization. Softchoice.com 1-800-268-7638 |