The Stunning Need for Improvement on Mobile and Cloud Risks

A recent study by the Ponemon Institute, The Risk of Regulated Data on Mobile Devices and in the Cloud*, reveals a stunning need for improvement on managing the risks of mobile devices and cloud computing services. The survey involved 798 IT and IT security practitioners in a variety of organizations including finance, retail, technology, communications, education, healthcare, and public sector, among others. The results are quite startling.

The study concluded that “the greatest data protection risks to regulated data exist on mobile devices and the cloud.” 69% of respondents listed mobile devices as posing the greatest risk followed by 45% who listed cloud computing.

Some other key findings include:

* Only 16% of respondents said their organization knew how much regulated data “resides in cloud-based file sharing applications such as Dropbox, Box, and others.”

* Only 19% said their organization knew how much regulated data was on mobile devices.

* Only 32% believed their organizations to be “vigilant in protecting regulated data on mobile devices.” Nearly three quarters said that employees didn’t “understand the importance of protecting regulated data on mobile devices.”

* 43% of organizations allow “employees to move regulated data to cloud-based file sharing applications.”

* Although 59% of organizations permit employees to use their own mobile devices “to access and use regulated data,” only about a third have a bring your own device (BYOD) policy.

* In the past two years, the average organization had almost 5 data breaches involving the loss of theft of a mobile device with regulated data on it.

Wow! These findings are quite alarming, and they show that organizations are significantly underappreciating the risks of mobile and cloud.

The Risks: What are the risks? Here are a few:

1. Unsafe Security Practices. With their own mobile devices and with their own cloud service provider accounts, employees might engage in unsafe security practices. Mobile devices might not be encrypted or even password-protected. When using cloud services, employees might not have the appropriate settings or an adequately strong password. They might not understand the risks or how to mitigate them.

2. Choice of Cloud Service Provider. There are many cloud service providers, and they vary considerably in terms of their privacy and security practices. Cloud service providers may not have adequate terms of service and may not provide adequate privacy protections or security safeguards.

3. Regulatory Troubles. If an employee of a HIPAA covered entity or business associate shares protected health information (PHI) with a cloud service provider, a business associate agreement is likely needed. Employees who just put PHI in the cloud might result in their organization being found in violation of HIPAA in the event of an audit or data breach.

4. The Ease of Sharing. Sharing files is quite easy with many cloud providers – sometimes too easy. All it takes is a person to accidentally put regulated data into a shared file folder, and . . . presto, it will be instantly shared with everyone with permission to view that folder. One errant drag and drop can create a breach.

5. The Ease of Losing. If you don’t carry an umbrella on an overcast day, it surely will rain. And if you put regulated data on a mobile device without adequate protection, that device will surely be lost or stolen. Call it “Murphy’s Mobile Device Law.”

Key Steps for Improvement: What should be done?

1. Educate the Cs. The C-Suite must be educated about these risks. These are readily-preventable risks that can be mitigated without tremendous expense.

2. Develop Policies. The study indicates that there is often a lack of policies about the use of mobile devices and cloud. There should be clear written policies about these things, and employees must be trained about these policies.

3. Educate the Workforce. Everyone must be educated about the risks of mobile devices and cloud and about good data security practices. According to the Ponemon Study, “Respondents believe that most employees at one time or another circumvent or disable required security settings on their mobile devices.” Employees must know more about the risks of using unapproved cloud service providers, as well as the special risks that cloud service applications can pose.

4. Instill Some Fear. The study reveals that almost systemically at most organizations, the risks of mobile and cloud are underappreciated and often ignored. There needs to be a healthy sense of fear. Otherwise, convenience will win.

The Ponemon Study reveals that there is a long way to go before most organizations adequately address the risks of mobile and cloud. The problem runs deeper than the fact that these risks are hard to redress. The problem seems to stem from the fact that the risks are woefully underappreciated by many in organizations, from the top to the bottom. That has to change, and soon.

Originally posted on SafeGov.org.

Daniel J. Solove is the John Marshall Harlan Research Professor of Law at George Washington University Law School, the founder of TeachPrivacy, a privacy/data security training company, and a Senior Policy Advisor at Hogan Lovells.

* The Risk of Regulated Data on Mobile Devices and in the Cloud*, June 2013, sponsored by WatchDox.

Volodymyr Krupach

Atlassian apps developer

11 年

Сompanys concentrate on PR and marketing and ignore simple coding/security standards and principles. Too much rush.

回复

I like the thought of a "healthy sense of fear". I like Cloud storage as a form of back up but understand the risks of HR sensitive data. I am excited to see how this develops in the years to come.

回复
Aditya Bhagat

Senior Manager, Salesforce Practice | Deloitte Digital

11 年

Daniel Solove These findings, though interesting, are not surprising. By enforcing stringent policies without understanding the impact and that cloud and mobile solutions are here to stay, many large organizations try to assume control over their workforce. This is futile, as I have observed in many instances, and the employees do find out ways to leverage cloud and mobile tools to get their work done. This increases the risk, since now the organization does not have 'real' control over what's going on. One option is to identify the needs of workforce and facilitate adoption of accredited cloud/mobile solutions instead of imposing blanket curbs. Maybe by giving away control, these organizations may gain it.

回复
John Biglin

CEO | CIO Advisor | Speaker | Best Selling Author

11 年

Good article. Unfortunately the risk of data loss and privacy breach is increasing rapidly as mobile and personal/individual cloud services use in corporate environments becomes more commonplace. One tool or tactic will not mitigate the risk. Rather, an overall framework addressing all the risk points needs to be planned & implemented so that multipoint protection measures can be put in place to minimize the risk. The good news is that there are proven methods to do so. However, just like a toothache, the longer companies wait to address this, the tougher and more expensive it will be to resolve.

回复
Emma Bentley

Student at Griffith University

11 年

WOW that was an amazing insight........

回复

要查看或添加评论,请登录

Daniel Solove的更多文章

  • Cybersecurity and Privacy

    Cybersecurity and Privacy

    In this newsletter I share some great resources on cybersecurity and privacy. Are Many Privacy Violations Also Data…

    1 条评论
  • Halloween Privacy and AI Cartoons

    Halloween Privacy and AI Cartoons

    In this newsletter I have a Halloween treat for you! Enjoy these Halloween cartoons. · Cartoon: AI Trick-or-Treating ·…

  • Teaching Privacy Law

    Teaching Privacy Law

    In this newsletter I have gathered some great resources on teaching privacy law. · Webinar: Teaching Information…

    1 条评论
  • HIPAA and Health Privacy

    HIPAA and Health Privacy

    HIPAA and health privacy are often a source of many questions. In this newsletter, I gather some resources I recently…

    1 条评论
  • AI's Fishy Branding

    AI's Fishy Branding

    One can learn a lot about AI from fish. The 1990s were a terrible time for the toothfish.

    18 条评论
  • Privacy Humor

    Privacy Humor

    For some summer fun, I thought I would offer some privacy humor from my cartoon archive. Privacy Humor Do you want…

    4 条评论
  • Essays on Privacy, AI, and Data Security

    Essays on Privacy, AI, and Data Security

    Here are some of my latest essays on privacy, AI, and data security: Against Privacy Essentialism Murky Consent: An…

    2 条评论
  • New Developments in Privacy Law

    New Developments in Privacy Law

    Believe it or not, there have been some new developments in privacy law. Today, I will be sharing some resources to…

    4 条评论
  • Free Speech and Social Media

    Free Speech and Social Media

    Several new laws and cases involve free speech and social media. Here are some writings, videos, and events related to…

    2 条评论
  • International Privacy Law

    International Privacy Law

    I have a long list of courses and whiteboards that I have developed for international privacy laws. Check them out…

社区洞察

其他会员也浏览了