Technology

76% of IT Decision-Makers Predict Cloud Applications Will Be Breached

By Judy Greenwald

May. 14, 2012



More than three-quarters of information technology decision-makers predict their cloud applications are likely to be breached, according to a survey of 1,300 officials in 13 countries by Cisco Systems Inc.

According to the survey released May 15, 76 percent of IT decision-makers predict their cloud applications are likely to be breached, and 24 percent “believe the odds are better for them to be struck by lightning than have their cloud applications breached by an unwanted third party,” according to the survey report.

During the cloud migration process, data protection security was cited by 72 percent as the top network challenge or roadblock responsible for preventing a successful implementation of cloud services. This was followed by availability/reliability of cloud applications, cited by 67 percent; device-based security, cited by 66 percent; visibility and control of applications across the Wide Area Network, cited by 60 percent; and overall application performance, cited by 60 percent, according to San Jose, California-based Cisco.

Among other survey results, 39 percent said they would not trust their own personal information, such as medical records and Social Security numbers, with the cloud provider they are now using.

The survey also found that while only 5 percent of IT decision-makers have been able to migrate at least half of their total applications to the cloud, that is expected to increase to 20 percent by the end of this year.

Copies of the 2012 Cisco Global Cloud Networking Survey are available here.

At a recent risk manager panel, participants said products, such as cyber policies designed to address cloud computing risks, are too underdeveloped in terms of the industry’s comprehension of the underlying exposures to justify purchasing.

Judy Greenwald writes for Business Insurance, a sister publication of Workforce Management. To comment, email editors@workforce.com.

 

Stay informed and connected. Get human resources news and HR features via Workforce Management’s Twitter feed or RSS feeds for mobile devices and news readers.

Judy Greenwald writes for Business Insurance, a sister publication of Workforce Management.

About Workforce.com

blog workforce

We build robust scheduling & attendance software for businesses with 500+ frontline workers. With custom BI reporting and demand-driven scheduling, we help our customers reduce labor spend and increase profitability across their business. It's as simple as that.

Book a call
See the software

Related Articles

workforce blog

Technology

4 Ways to Maximize HR and WFM Data

Technology and cloud-based applications and platforms enable companies to gather more data, but can the...

workforce blog

Technology

How to prevent workforce management system outages: mitigation through redundancy

Summary Workforce management data breaches and outages are a very real threat Businesses should build r...

data breach, network security, payroll system, system outage, workforce management

workforce blog

Technology

Kronos (UKG) data breach leaves businesses in the dark for “several weeks”

Summary Workforce management company Kronos (UKG) suffers ransomware data breach Kronos Private Cloud a...

data breach, Kronos, ransomware, security, UKG