Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > BRING YOUR OWN CLOUD – IS MORE RAIN ON THE WAY?
    Technology

    BRING YOUR OWN CLOUD – IS MORE RAIN ON THE WAY?

    BRING YOUR OWN CLOUD – IS MORE RAIN ON THE WAY?

    Published by Gbaf News

    Posted on April 2, 2014

    Featured image for article about Technology

    Andy Travers, Vice President of EMEA (North, West, Central) for Fortinet

    It appears that climate change is finally starting to make itself felt, certainly across Europe and particularly the UK, which is experiencing its wettest winter on record with widespread flooding causing chaos. Emergency agencies across the continent have been mobilised and are working to rescue affected communities, hold back floodwater and repair damaged infrastructure. The challenge for governments now is to try and shore up the defences against inevitable future flooding.

    If only they had prepared the defences adequately in advance, we might not be witnessing such widespread devastation now.

    Bring Your Own Cloud – Is More Rain On The Way?

    Bring Your Own Cloud – Is More Rain On The Way?

    This situation is a perfect analogy for what the business world is experiencing with regards to the threats and occasional devastation created by BYOD and, increasingly, Bring Your Own Cloud. The corporate world has seen a flood of mobile devices, and increasingly personal cloud accounts, entering its midst and, for the most part, has been struggling to keep control. There has become urgency for adopting the right security strategy in order to stop the steady stream becoming an incontrollable flood, so to speak.

    Both climate change and BYOD are underpinned by our own innocence, ignorance and selfishness having a detrimental effect on the corporate world. In the case of younger employees, they have become accustomed to using their own devices and cloud applications and have an expectation to continue doing so in the work environment. Such is the pervasive and ubiquitous nature of cloud applications – now loaded as default on all modern smartphones, tablets and computers in the form of applications such as Dropbox and iCloud – that many younger people genuinely do not realise they are using the cloud, and if they do, are unaware or unconcerned about the potential dangers. And as a recent Fortinet global survey illustrated, far too many are resistant to any suggestion that they should alter their behaviour for the safety of the organisation.

    The Fortinet survey of 3,200 21-32 year old employees across 20 countries should serve as a further dramatic warning for businesses to take this issue seriously and to put in place adequate and future-proof defence strategies. The vast majority of employees surveyed (89%) have personal accounts for at least one cloud storage service. 70% have used personal cloud storage for work purposes, with 12% admitting to storing work passwords, 16% financial information, 22% critical documents such as contracts and business plans, and 33% storing customer data. Alarmingly, 36% said they would contravene any policy banning personal cloud account use at work, even though increasing numbers of users are or have experienced cyber attacks themselves.

    The risk to the enterprise is posed by the very blurring of the boundaries between personal and business use of online applications. Users are more careless and vulnerable in their personal computing habits than they are in a work context. For example, recreational applications, such as those spread via social media, are fertile grounds for malware. Once the cyber criminal has access to the user’s device, it will not be the Facebook or Twitter password that interests him, but the valuable assets such as financial information and passwords and the increasingly valuable Intellectual Property and business data that will be stored either on the user’s device or their personal cloud application. These are the assets the cyber criminal can get good money for. In a world where information and data are highly valuable and critical to the business, no enterprise can afford to let their own data be used against them or for the benefit of competitors.

    Cybercriminals launching persistent attacks are aided and abetted by unwitting personal users who, the cybercriminal naturally assumes, will offer an easy access point for valuable business data via their personal devices. It is easier to get access to corporate data via the user in their personal realm than it is to attempt to break directly in to the enterprise network. And this situation is made even more sinister because the enterprise will often not be aware that the employee is transferring business data to their own device or personal cloud. How many businesses realise that 1-in-5 of their employees store critical business documents in their personal cloud? It is undoubtedly the case that many serious security breaches and thefts of company data are covertly conducted in this way and are never noticed.

    With the impending widespread introduction of new connected technologies such as wearable computing, smart watches and connected cars, the situation is only set to become more complicated. Businesses need to heed this new warning and develop their strategies accordingly, implementing security intelligence at a network level to enable control of user activity based on device, applications and location.

    As the Fortinet survey shows, businesses are largely ignorant of exactly where their critical business data is being stored by employees, and thus employees are increasingly the weak link in the security stance. IT managers need to develop strong policies and strategies to take account of the personal cloud. Alternatively, invest in some new buckets and mops in readiness for the inevitable cloudburst and flooding.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostELEVATE CUSTOMER ENGAGEMENT TO THE CLOUD
    Next Technology PostCLIO AND FUJITSU PARTNER TO PROVIDE CLOUD DOCUMENT SCANNING FOR LEGAL OFFICES

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts