Story image

How the cloud is leaving two thirds of organisations vulnerable in A/NZ

Bitglass released the 2018 Cloud Adoption Report, its fourth such study, which examines the cloud applications used in more than 135,000 organisations around the globe. 

The report corroborates what is now broadly apparent, the flexibility, productivity and cost savings benefits of cloud apps have fueled widespread adoption in every industry. 

Surprisingly, the report finds that the adoption of cloud security technologies lags cloud adoption, leaving many at risk of a data breach.   While 81% of organisations worldwide and 84% of organisations in Australia and New Zealand are leveraging cloud productivity suites, relatively few are securing their use of cloud with single sign-on (SSO). 

Despite the fact that SSO is a critical security tool in the enterprise, about two-thirds of organisations are failing to utilise it in Australia and New Zealand.   In addition to revealing adoption metrics for single sign-on, Bitglass’ 2018 Cloud Adoption Report uncovers deployment rates for a host of different cloud-based tools, including Office 365, G Suite, AWS, Slack, Box, and Salesforce.   Key findings:

  • The analysis of more than 135,000 organisations indicates that global cloud adoption has topped 81%, a 37% increase since 2016 and a 238% increase since 2014. In Australia and New Zealand, cloud adoption has reached 84%.
  • Just over a quarter of Australian and New Zealand organisations now use SSO solutions, a mere one-third of those using the cloud. This disparity suggests that two-thirds of companies in the region will suffer from breaches related to improper authentication.
  • Office365 now boasts more than twice as many deployments as G Suite worldwide. In Australia and New Zealand the trend holds, G Suite usage stands at 27% while Office 365 adoption has reached 57%.
  • Amazon Web Services (AWS) has emerged as the go-to infrastructure as a service (IaaS) solution. While 13.8% of companies worldwide are using AWS, those in Australia and New Zealand seem more eager to leverage Amazon’s IaaS offering, boasting a 22% adoption rate.

Using internally developed technologies, the Bitglass research team scanned more than 135,000 companies in order to identify the cloud services that they use. 

This automated analysis scrutinised cloud productivity suites like Office 365 and G Suite, top cloud applications ranging from messaging apps like Slack to file sync and share apps like Box, as well as single sign-on, an increasingly fundamental cloud security technology.

Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
NZ ISPs issue open letter to social media giants to discuss censorship
Content sharing platforms have a duty of care to proactively monitor for harmful content, act expeditiously to remove content which is flagged to them as illegal.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
Bitdefender invests in A/NZ with new offices and regional director
Bitdefender has opened its Partner Advantage Network (PAN) programme with the aim of recruiting and supporting its over 500 local resellers.
Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.
Online attackers abusing Kiwis' generosity in wake of Chch tragedy
It doesn’t take some people long to abuse people’s kindness and generosity in a time of mourning.
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.