SlideShare una empresa de Scribd logo
1 de 9
Top Threats Facing Organizations
Cloud / SaaS Data
Executive Briefing
Numerous Threats to
Data and Business Continuity
Data Loss : Deletion or corruption of
data that can not be recovered
Exposure : Unauthorized access to
sensitive information
Inaccessibility : Unable to access to
critical data due to outage
Compliance Breach: Failure to comply
with federal or industry data regulations
What Are The Experts Saying?
CLOUD SECURITY ALLIANCE
The Top Nine Threats to Cloud Computing
#1 : Data Breaches and Leakage
#2 : Data Loss
THE ABERDEEN GROUP
SaaS Data Loss: The Problem You Didn’t Know You Had
32% of companies have lost data in the cloud
SYMANTEC
Avoiding the Hidden Costs of the Cloud
66% of organizations that lost data were unsuccessful in
recovering information
Devastating Effects of Data Loss and Exposure
The impact from lost data or exposure
can cripple an organization:
● Loss of revenue due to missing data
● Cost of data replacement / wasted time
● Tarnished brand / reputation
● Repercussions due to policy breach
“My Data is Safe, I’m on Google”
Google Apps is extremely
reliable and provides:
● Physical security around data
● Protection against data loss
related to infrastructure
● Settings to allow users to set
data privacy levels
Risk to Data Due to Users Not Google
Research found the following risks:
● Over 60% of data loss in Google Apps is
caused by user action or error
● Almost 40% of organizations have had
sensitive data exposed in the cloud
● 8% have lost data due to malicious means
● 3% have seen data deleted or corrupted
by third-party applications
Summary
● Multiple threats exists to cloud data
● Organizations affected are widespread
● It’s not the cloud providers that pose risk
● Most loss is caused by users, authorized
apps or malicious act
● Impact to business can be severe
Steps You Can Take to Protect and
Secure your Organization’s Google Apps Data
● Use of cloud data backup and recovery applications
to protect data regardless of the root cause
● Implement your corporate security policies to keep
sensitive data private to only authorized or intended
parties
● Leverage data loss protection applications to limit
exposure of PII and sensitive information
● Choose tools that are proactive, automated and
operate continuously without constant intervention
Top Threats Facing Organizations Cloud / SaaS Data

Más contenido relacionado

La actualidad más candente

IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance BoosterMaëlle Piquée
 
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016TNSIMarketing
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Maestro
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT Innovators
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report Netskope
 
What is the safest vpn to use
What is the safest vpn to useWhat is the safest vpn to use
What is the safest vpn to useSathish Kumar M
 
ISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEM
ISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEMISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEM
ISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEMRozil Anwar
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report Netskope
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 
5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)BeyondTrust
 
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...iFour Consultancy
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportNetskope
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident DetectionTripwire
 
Security and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowSecurity and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowThe Internet of Things
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local GovDonald E. Hester
 

La actualidad más candente (20)

Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
 
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
 
What is the safest vpn to use
What is the safest vpn to useWhat is the safest vpn to use
What is the safest vpn to use
 
ISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEM
ISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEMISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEM
ISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEM
 
Symantec_infographic_final
Symantec_infographic_finalSymantec_infographic_final
Symantec_infographic_final
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)
 
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud Report
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection
 
Security and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowSecurity and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to Know
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 

Similar a Top Threats Facing Organizations Cloud / SaaS Data

Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention ToolsSplitty
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockCloudLock
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Every cloud cloud risk assessment 2018
Every cloud cloud risk assessment  2018Every cloud cloud risk assessment  2018
Every cloud cloud risk assessment 2018soniamcpherson11
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxElastica Inc.
 

Similar a Top Threats Facing Organizations Cloud / SaaS Data (20)

Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Every cloud cloud risk assessment 2018
Every cloud cloud risk assessment  2018Every cloud cloud risk assessment  2018
Every cloud cloud risk assessment 2018
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 

Más de SysCloud

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
SysCloud Overview
SysCloud Overview SysCloud Overview
SysCloud Overview SysCloud
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceSysCloud
 
Popular privacy & security laws you should know
Popular privacy & security laws you should knowPopular privacy & security laws you should know
Popular privacy & security laws you should knowSysCloud
 
Syscloud Release Notes - Q1, 2017
Syscloud Release Notes - Q1, 2017Syscloud Release Notes - Q1, 2017
Syscloud Release Notes - Q1, 2017SysCloud
 
Risks of not complying with cipa & ferpa
Risks of not complying with cipa & ferpaRisks of not complying with cipa & ferpa
Risks of not complying with cipa & ferpaSysCloud
 
SysCloud's June 2016 Release
SysCloud's June 2016 ReleaseSysCloud's June 2016 Release
SysCloud's June 2016 ReleaseSysCloud
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerSysCloud
 
How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google appsSysCloud
 
How to do pci compliance in google apps presentation
How to do pci compliance in google apps presentationHow to do pci compliance in google apps presentation
How to do pci compliance in google apps presentationSysCloud
 
Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps SysCloud
 

Más de SysCloud (11)

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
SysCloud Overview
SysCloud Overview SysCloud Overview
SysCloud Overview
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
 
Popular privacy & security laws you should know
Popular privacy & security laws you should knowPopular privacy & security laws you should know
Popular privacy & security laws you should know
 
Syscloud Release Notes - Q1, 2017
Syscloud Release Notes - Q1, 2017Syscloud Release Notes - Q1, 2017
Syscloud Release Notes - Q1, 2017
 
Risks of not complying with cipa & ferpa
Risks of not complying with cipa & ferpaRisks of not complying with cipa & ferpa
Risks of not complying with cipa & ferpa
 
SysCloud's June 2016 Release
SysCloud's June 2016 ReleaseSysCloud's June 2016 Release
SysCloud's June 2016 Release
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance center
 
How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google apps
 
How to do pci compliance in google apps presentation
How to do pci compliance in google apps presentationHow to do pci compliance in google apps presentation
How to do pci compliance in google apps presentation
 
Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Top Threats Facing Organizations Cloud / SaaS Data

  • 1. Top Threats Facing Organizations Cloud / SaaS Data Executive Briefing
  • 2. Numerous Threats to Data and Business Continuity Data Loss : Deletion or corruption of data that can not be recovered Exposure : Unauthorized access to sensitive information Inaccessibility : Unable to access to critical data due to outage Compliance Breach: Failure to comply with federal or industry data regulations
  • 3. What Are The Experts Saying? CLOUD SECURITY ALLIANCE The Top Nine Threats to Cloud Computing #1 : Data Breaches and Leakage #2 : Data Loss THE ABERDEEN GROUP SaaS Data Loss: The Problem You Didn’t Know You Had 32% of companies have lost data in the cloud SYMANTEC Avoiding the Hidden Costs of the Cloud 66% of organizations that lost data were unsuccessful in recovering information
  • 4. Devastating Effects of Data Loss and Exposure The impact from lost data or exposure can cripple an organization: ● Loss of revenue due to missing data ● Cost of data replacement / wasted time ● Tarnished brand / reputation ● Repercussions due to policy breach
  • 5. “My Data is Safe, I’m on Google” Google Apps is extremely reliable and provides: ● Physical security around data ● Protection against data loss related to infrastructure ● Settings to allow users to set data privacy levels
  • 6. Risk to Data Due to Users Not Google Research found the following risks: ● Over 60% of data loss in Google Apps is caused by user action or error ● Almost 40% of organizations have had sensitive data exposed in the cloud ● 8% have lost data due to malicious means ● 3% have seen data deleted or corrupted by third-party applications
  • 7. Summary ● Multiple threats exists to cloud data ● Organizations affected are widespread ● It’s not the cloud providers that pose risk ● Most loss is caused by users, authorized apps or malicious act ● Impact to business can be severe
  • 8. Steps You Can Take to Protect and Secure your Organization’s Google Apps Data ● Use of cloud data backup and recovery applications to protect data regardless of the root cause ● Implement your corporate security policies to keep sensitive data private to only authorized or intended parties ● Leverage data loss protection applications to limit exposure of PII and sensitive information ● Choose tools that are proactive, automated and operate continuously without constant intervention

Notas del editor

  1. There are numerous threats organizations can face when leveraging SaaS / Cloud. They include data loss, exposure of sensitive information, inability to access the application and potential compliance issues depending on the organization.
  2. Experts are now listing Data Exposure and Loss as top threats to organizations utilizing cloud products. Cloud Security Alliance have these threats as #1 and #2 -- both moving up 5 spots from the year before. A recent study found almost a third of companies have lost data and what’s even more surprising is that 66% were unsuccessful in recovering information.
  3. Any organization would suffer if it lost critical data that couldn’t be recovered. It’s a major cost : loss of revenue, productivity, time to recreate data. Projects, information or business initiatives all stored only in Google Apps. Is there Sensitive data that exist in your users Google Drives? How can you be aware of what information users upload and share. Even if you’re not governed by any regulations related to your data - Most every organization could be liable for certain data exposures.
  4. Google Apps is extremely reliable. SysCloud runs most of our business on Google Apps. I’m not worried that Google is going to expose or delete my data. However if you read the terms and conditions of almost any SaaS product you’ll find it considerably limits their exposure and the burden of loss is on the client.
  5. The issue is with authorized users who are operating within the application -- 60% of data loss on Google is cause by user action or error. Do you know how long you have before a file is permanently delete and unrecoverable? Just a few days. That means you could have a file deleted on Friday and it’s gone forever on Monday Since there’s only one owner many critical files are depended on a single individual for safeguarding. What about the time a data exposure could cause harm to your organization? Immediate! IMAGE: Person / Human
  6. Threats to data can come from anywhere -- it’s not the cloud providers but most likely within the organization that poses the biggest risk and the impact can be huge.
  7. Most threats can be mitigated or eliminated through: #1 Best practices implemented for passwords or SSO #2 Proper training for users on sharing data and permissions #3 Automated Backups #4 Security & Compliance Tools #5 Locking down permissions and limiting 3rd applications