Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Shadow IT and Shadow Data keeping the CISO up at night

Damien Manuel | June 30, 2016
All across your company, in every department, employees are using apps that you haven’t tested, secured or sanctioned.

2.Educate your employees on the security risks of indiscriminately sharing documents both within the organisation and with external stakeholders. The more broadly documents are shared or circulated, the higher the likelihood that someone they don't know or trust will have access to that data. Similarly, IT can leverage CASB solutions to identify what documents with sensitive or regulated data their employees are sharing and how broadly they are being shared.

3.Know your cloud-shared data. You cannot protect what you cannot see, and that goes for your data as well as the cloud applications themselves. A full-function CASB solution should enable you to drill down into your cloud-stored documents and categorise them as sensitive or compliance-related data, as well as classify them into business categories (i.e. Legal, Business, Medical, etc.). Such identification and classification enables you to more effectively apply appropriate cloud data security measures.

Source: CSO Australia

 

Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.