More than two-thirds (67 per cent) of organizations admit that unauthorized cloud applications are being implemented without IT’s knowledge or involvement, and correspondingly pose a security risk to the business. This is according to a snapshot poll by Centrify at Cloud Expo Europe last week in London.
As shadow IT becomes a bigger challenge for businesses – with employees downloading applications without going through a formal IT procurement process – around 40 per cent of respondents said that between 10-20 per cent of cloud services are now being purchased outside of IT.
A fifth admitted that between 10-20 per cent of cloud applications are being implemented without any knowledge or involvement from IT, while half of respondents believed it was less than 10 per cent.
“It probably seems like an easy solution for people looking to cut corners and avoid having to go through the formal process of getting IT approval,” says Barry Scott, CTO EMEA at Centrify. “The problem is that so much cloud-based software is easily available and requires no IT skills whatsoever to manage, so staff are just downloading the tools they like or that will help in their work, without considering the risks.
“While half of our poll respondents were confident that less than 10 per cent of applications were being implemented without their knowledge, they are likely to be underestimating the extent of shadow IT in their organization. Without the necessary controls and security policies in place, including passwords and authentication, unauthorized cloud apps are opening up corporate data to the risk of compromise,” adds Scott.