Over a million developers have joined DZone.

8 Steps to Fight SMB Cloud Security Threats

DZone's Guide to

8 Steps to Fight SMB Cloud Security Threats

Whether innocent or malicious, if employees aren't using proper cloud security practices, it could prove harmful to your sensitive data.

· Security Zone ·
Free Resource

Discover how to provide active runtime protection for your web applications from known and unknown vulnerabilities including Remote Code Execution Attacks.

With IT department resources and budgets stretched thin, employees are taking IT matters into their own hands. Even though these employees aren’t expected to be technical experts, they have the de facto responsibility to uphold IT security. The people tasked with upholding security are mostly unaware of the risks, or not concerned enough about the risks to change their habits.

The SMB Shadow IT Problem

Shadow IT looks different in SMBs than in large enterprises. The problem for SMBs isn’t the unauthorized use of cloud apps. This would imply that employees are breaking the rules and subverting their IT departments when they use cloud apps. Instead, Shadow IT in SMBs is more likely to be the result of a complete absence of authorization and control processes for cloud apps.

There are tens of thousands of cloud apps available on the market today, and each business averages the use of more than 700 cloud apps. Security experts estimate that less than 10% of these apps meet enterprise data, security, and legal requirements, so most cloud apps represent a completely ignored threat vector for businesses. As a result, the problem of Shadow IT is growing for SMBs much more than in their enterprise counterparts.

Common Cloud Security Threats

The worst offenders are single use cloud apps such as free file conversion tools and file storage and sharing tools. When people need to convert JPGs into PDFs or send a large file to someone in the field, they upload potentially sensitive data into untrustworthy cloud apps. Fingers crossed this data is never viewed or stolen. In the best case scenario, an SMB is just incompliant.

Instead of crossing your fingers and hoping for the best, here’s what SMBs should do:

  1. Make Shadow IT a priority – Start with Visibility.
  2. Engage with employees about their technical needs and wants.
  3. Make sure IT is keeping pace with employees needs.
  4. Allow for cloud app experimentation and innovation with non-sensitive data.
  5. Clearly communicate the risks of Shadow IT and security priorities.
  6. Create guidelines and processes for cloud app use.
  7. Provide standardized cloud apps to streamline use.
  8. Consistently re-evaluate cloud app use.

The hardest part is the first step – making Shadow IT a priority. That first step adds another “to-do” to an organization’s already long checklist. Once the ball is rolling, addressing Shadow IT isn’t very hard or time-consuming. Most SMBs can get by through just passively monitoring cloud use and taking corrective measures when necessary. So when is your company going to take that first crucial step?

Find out how Waratek’s award-winning application security platform can improve the security of your new and legacy applications and platforms with no false positives, code changes or slowing your application.

security ,cloud security ,security compliance ,infosec

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}