Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/21/2020
05:35 PM
50%
50%

Remote Work Exacerbating Data Sprawl

More than three-quarters of IT executives worry that data sprawl puts their data at risk, especially with employees working from insecure home networks, survey finds.

IT executives increasingly worry about the extent to employees have saved their company's data in unprotected devices or sent sensitive information through insecure services, according to a survey released by data-governance firm Egnyte last week.

The survey, conducted in August, found that more than three-quarters of CIOs had concerns about content sprawl, with 38% very concerned about the issue. While the degree of data sprawl often depends on the department, the rapid move to remote work because of the coronavirus pandemic has become the No. 1 reason cited by CIOs for data replicating to insecure environments.

Related Content:

Is Your Organization Suffering from Security Tool Sprawl?

The Threat from the Internet—and What Your Organization Can Do About It

New on The Edge: A Hacker's Playlist

Employees may copy data to their home systems, even if those systems are not maintained or visible to the company, says Kris Lahiri, chief technology officer of Egnyte.

"In a lot of cases, the worker has problems getting stuff done, so they take an easier solution, whether it was insecurely sending something over email or a personal device," he says. "People needs to realize that basic digital hygiene is important to visit."

Then survey underscores that the skyrocketing growth in data stored and used by companies has made it harder to keep important and sensitive information secure, while at the same time, allowing access to the information to authorized users.  

Nearly half of the survey respondents, for example, believe that employees had access to information they should not be able to access, while 40% of CIOs encountered employees who could not access data that they should be able to access.

"We do find lots of duplicate repositories," Lahiri says. "Take for example, a CRM [customer relationship management] solution and — even if someone has picked Salesforce as their main solution — the data finds its way into all sorts of places."

The coronavirus pandemic has forced companies to embrace remote workers, with more than three-quarters of companies having most of their employees work outside of the office, according to a June survey by consultancy PwC. Even after pandemic conditions have subsided, almost 90% of companies expect many — 30% or more — of employees to work out of the office at least some of the time.

While employees overwhelmingly support remote work, collaborating with other team members is the No. 1 reason some miss the office, and difficulty in collaborating the No. 2 reason employees felt unproductive at home, the PwC survey found.

"Provide everyone with the collaboration tools and access to data they need to work remotely effectively," the company recommended. "This may include small stipends to pay for home office equipment or high-speed Internet. Be sure to assess and close the security and control gaps in your remote work setup."

Many IT executives worry that their employees are not following the policies for keeping data secure. About a third of respondents to the Egnyte survey, for example, would give their worker a grade of C or lower for their ability to keep data secure.

Among the top issues for companies are employees use of personal devices for work. While more than third of employees are using personal devices to access company files, two-thirds of companies do not have policies for password requirements on personal devices, restrictions on using personal devices for work, or mandates that persona devices are not left unattended.

Companies should determine their most valuable data, determine the risks to those assets, and give authorized users a frictionless way to access the information to do their work, says Lahiri. 

"Companies should focus on reducing their content sprawl," he says. "Pick the top, most valuable few categories of data and repositories, and make those easy to collaborate on and share. By doing so, you are making it less likely that users circumvent your policies."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-36192
PUBLISHED: 2021-01-18
An issue was discovered in the Source Integration plugin before 2.4.1 for MantisBT. An attacker can gain access to the Summary field of private Issues (either marked as Private, or part of a private Project), if they are attached to an existing Changeset. The information is visible on the view.php p...
CVE-2020-36193
PUBLISHED: 2021-01-18
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...