Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/21/2020
05:35 PM
50%
50%

Remote Work Exacerbating Data Sprawl

More than three-quarters of IT executives worry that data sprawl puts their data at risk, especially with employees working from insecure home networks, survey finds.

IT executives increasingly worry about the extent to employees have saved their company's data in unprotected devices or sent sensitive information through insecure services, according to a survey released by data-governance firm Egnyte last week.

The survey, conducted in August, found that more than three-quarters of CIOs had concerns about content sprawl, with 38% very concerned about the issue. While the degree of data sprawl often depends on the department, the rapid move to remote work because of the coronavirus pandemic has become the No. 1 reason cited by CIOs for data replicating to insecure environments.

Related Content:

Is Your Organization Suffering from Security Tool Sprawl?

The Threat from the Internet—and What Your Organization Can Do About It

New on The Edge: A Hacker's Playlist

Employees may copy data to their home systems, even if those systems are not maintained or visible to the company, says Kris Lahiri, chief technology officer of Egnyte.

"In a lot of cases, the worker has problems getting stuff done, so they take an easier solution, whether it was insecurely sending something over email or a personal device," he says. "People needs to realize that basic digital hygiene is important to visit."

Then survey underscores that the skyrocketing growth in data stored and used by companies has made it harder to keep important and sensitive information secure, while at the same time, allowing access to the information to authorized users.  

Nearly half of the survey respondents, for example, believe that employees had access to information they should not be able to access, while 40% of CIOs encountered employees who could not access data that they should be able to access.

"We do find lots of duplicate repositories," Lahiri says. "Take for example, a CRM [customer relationship management] solution and — even if someone has picked Salesforce as their main solution — the data finds its way into all sorts of places."

The coronavirus pandemic has forced companies to embrace remote workers, with more than three-quarters of companies having most of their employees work outside of the office, according to a June survey by consultancy PwC. Even after pandemic conditions have subsided, almost 90% of companies expect many — 30% or more — of employees to work out of the office at least some of the time.

While employees overwhelmingly support remote work, collaborating with other team members is the No. 1 reason some miss the office, and difficulty in collaborating the No. 2 reason employees felt unproductive at home, the PwC survey found.

"Provide everyone with the collaboration tools and access to data they need to work remotely effectively," the company recommended. "This may include small stipends to pay for home office equipment or high-speed Internet. Be sure to assess and close the security and control gaps in your remote work setup."

Many IT executives worry that their employees are not following the policies for keeping data secure. About a third of respondents to the Egnyte survey, for example, would give their worker a grade of C or lower for their ability to keep data secure.

Among the top issues for companies are employees use of personal devices for work. While more than third of employees are using personal devices to access company files, two-thirds of companies do not have policies for password requirements on personal devices, restrictions on using personal devices for work, or mandates that persona devices are not left unattended.

Companies should determine their most valuable data, determine the risks to those assets, and give authorized users a frictionless way to access the information to do their work, says Lahiri. 

"Companies should focus on reducing their content sprawl," he says. "Pick the top, most valuable few categories of data and repositories, and make those easy to collaborate on and share. By doing so, you are making it less likely that users circumvent your policies."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27706
PUBLISHED: 2021-04-14
Buffer Overflow in Tenda G1 and G3 routers with firmware version V15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/"IPMacBindIndex "request. This occurs because the "formIPMacBindDel" function directly passes the parameter "IPMacBind...
CVE-2021-27707
PUBLISHED: 2021-04-14
Buffer Overflow in Tenda G1 and G3 routers with firmware v15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/"portMappingIndex "request. This occurs because the "formDelPortMapping" function directly passes the parameter "portMappingIn...
CVE-2021-28098
PUBLISHED: 2021-04-14
An issue was discovered in Forescout CounterACT before 8.1.4. A local privilege escalation vulnerability is present in the logging function. SecureConnector runs with administrative privileges and writes logs entries to a file in %PROGRAMDATA%\ForeScout SecureConnector\ that has full permissions for...
CVE-2021-30493
PUBLISHED: 2021-04-14
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the ChromaBroadcast subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other wor...
CVE-2021-30494
PUBLISHED: 2021-04-14
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other wo...