Recent show that while IT executives and companies have become increasingly comfortable with the security of third-party cloud computing service providers, more than half are concerned about data security and compliance at the end user level.
People are bringing to work their own devices and using smartphone apps for data storage, communications and collaboration. This “shadow IT” — IT solutions built or used inside organizations without the company’s approval — is predicted to exceed 35% of enterprise IT expenditures by 2015, according to Gartner.
Corporate and governmental espionage or hackers are one data security problem, but so are employees who use cloud computing to put company information online with their smartphones and tablets. The problem of data leakage is as old as someone taking a carbon copy home on the weekend. After the data leaves the corporate network, protecting it becomes much harder.
The world is changing, and your business customer may sometimes be the most appropriate owner of a particular application. Perhaps we’re witnessing the transition from “command-and-control IT” to what some veteran business and IT strategists call “cooperative IT.”
“We need to empower employees, but we also need to teach them about [data security and cloud computing],” says Kraft Foods CIO Mark Dajani. Today’s IT executives and businesses are now challenged to craft data security and cloud computing policies that will work for both IT departments and end users who want to innovate using cloud-based consumer technology.