What takes better pictures, a DSLR or a mobile phone? What has better sound, a HiFi stereo or a phone? How does a phone compare to an agenda? How well can you type on a phone compared to a desktop keyboard? Still, in your pocket you have a phone and you’re not carrying a PDA, Zune, camera, agenda, compass and encyclopedia with you all day. Because most of the time, the phone is ‚good enough‘ at all of these functions and the benefit of having a compact, efficient and easy to use device outweighs the small technical differences. Even better, the synergies you get from having an integrated device bring benefits, like real time updates to the maps or streaming music!
The same is true in the software world! Employees in modern organizations use sometimes dozens different free and paid online services for tracking tasks and tickets, managing blogs, updating documentation, editing files, communicating with partners and more (28 different online tools for a small startup is no exception!). But this outgrowth of IT services complicates work and multiplies the risk of data leaks.
Inefficiency and waste of time
1. Tools don’t connect so data is uploaded to multiple places and employees lose track of what is where2. More different services means more frequent service disruption (and discontinued services!) blocking employees from working3. Each tool has a different user interface, requiring more of training and causing mistakes4. Nobody knows who has access to what tool and who manages which accounts5. The IT department loses track of the services and ends up paying for unused accounts
You thought that a breach in a non-critical online tool is low-risk?Guess what, the hacked passwords were re-used on critical company infrastructure.
Security risks
6. Uploading data to multiple platforms means multiplying the risk of a data breach7. Loss of visibility and ability to track where data is and who has access8. Complicated reporting on data breach causes compliance issues9. Central or connected authentication and storage means breach in one is breach in all10. Password re-use by employees across platforms means even a breach in a low-risk service risks all
Now what?
Of course, just eliminating all these systems is no solution. Your teams need to get work done and employees will resort to these online tools, even if you don’t allow, sanction or manage it. Illicit use of private accounts consumer clouds by employees are one of the major causes of data leaks. And a study by Veritas Technologies shows the wild growth in cloud services multiplies the cost of ransomware attacks, so reducing the number of clouds where your sensitive business data is floating around in is paramount.
Frequent audits of the use and number of accounts on public cloud services, as well as policies, training and supervision over password use and what gets uploaded where is important. But ultimately, those are work-arounds that rely on employees never making mistakes!
Only consolidating the many cloud solutions can solve the root cause. An on premise, extensible and infrastructure-integrated solution that can not only fulfill the tasks of dozens of cloud services but does that in a single, unified and easy to use interface means improved productivity and reduced risk. Try Nextcloud Hub today.
Nextcloud ist die erste Cloud-Plattform, die mit dem Umweltzeichen „Blauer Engel“ ausgezeichnet wurde und damit beweist, dass eine digital souveräne und grüne IT möglich ist.
Wir stellen Nextcloud Talk „Munich“ vor - eine digital souveräne Open-Source-Kommunikationsplattform für hybride Teams, die eine starke Antwort auf die Clouds von Big Tech bietet. Jetzt noch resilienter, leistungsfähiger und einfacher in der Anwendung. Erfahren Sie mehr.
Willkommen bei Nextcloud Hub 10. Die neueste Version der Plattform bietet eine besserte Leistung für alle Apps, besser Integration Plattform und Dutzende neuer Funktionen, die Ihnen den Alltag erleichtern werden.
Unternehmen, ob klein oder groß, brauchen eine Möglichkeit, die Ausfallsicherheit und digitale Souveränität ihrer Abläufe zu gewährleisten - eine Open-Source-Alternative zu Teams, die die Privatsphäre respektiert. Und heute stellen wir diese Lösung vor - Nextcloud Talk.
Bechtle und Nextcloud kündigen heute eine vollständig verwaltete Kollaborationsplattform für den öffentlichen Sektor an, die keiner Ausschreibung bedarf und sofort bereitgestellt werden kann.
Our mission is to help individuals, businesses and organizations achieve digital sovereignty and regain control over their data. Nextcloud Hub 5 marks a massive step forward towards achieving this mission, putting the power of AI into your hands – in a way that keeps you in control. New release, new possibilities Hub 5 builds on […]
Almost seven years ago, in October 2018, our CEO and founder Frank Kartlitschek used the € 20,000 from winning the prestigious Reinhard von Koenig award to launch a brand new initiative: “Nextcloud Include.” As an open source diversity project, Nextcloud Include addresses the needs of underrepresented groups to join the Nextcloud project. By building an […]
Anfang 2025 begannen US-Hyperscaler, in einer großen PR-Kampagne neue „souveräne Cloud“-Angebote in Europa zu bewerben. In den letzten Wochen ist ihr Narrativ jedoch in sich zusammengebrochen. Es sind nicht die Kritiker, die die Widersprüche aufdecken – die Technologieunternehmen selbst haben zugegeben, dass ihre „souveränen” Versprechen heiße Luft sind.
Passionate about data privacy and Nextcloud? We invite you speak at the Nextcloud Community Conference to share your experience, knowledge and news with the community!
Wir speichern einige Cookies, um Besucher zu zählen und die Nutzung der Website zu erleichtern. Diese verlassen unseren Server nicht und dienen nicht der Verfolgung Ihrer online-Aktivitäten.
Weitere Informationen hierzu finden Sie in unserer Datenschutzrichtlinie. Anpassen
Statistik-Cookies sammeln anonym Informationen und helfen uns zu verstehen, wie unsere Besucher unsere Website nutzen. Wir verwenden cloud-gehostetes Matomo
Dienst:Matomo
Cookie-Beschreibung:
_pk_ses*: Zählt den ersten Besuch des Benutzers
_pk_id*: Hilft, die Besuche nicht doppelt zu zählen.
mtm_cookie_consent: Erinnert daran, dass der Nutzer seine Zustimmung zur Speicherung und Verwendung von Cookies gegeben hat.
Cookie-Ablauf:_pk_ses*: 30 Minuten
_pk_id*: 28 Tage
mtm_cookie_consent: 30 Tage