What takes better pictures, a DSLR or a mobile phone? What has better sound, a HiFi stereo or a phone? How does a phone compare to an agenda? How well can you type on a phone compared to a desktop keyboard? Still, in your pocket you have a phone and you’re not carrying a PDA, Zune, camera, agenda, compass and encyclopedia with you all day. Because most of the time, the phone is ‚good enough‘ at all of these functions and the benefit of having a compact, efficient and easy to use device outweighs the small technical differences. Even better, the synergies you get from having an integrated device bring benefits, like real time updates to the maps or streaming music!
The same is true in the software world! Employees in modern organizations use sometimes dozens different free and paid online services for tracking tasks and tickets, managing blogs, updating documentation, editing files, communicating with partners and more (28 different online tools for a small startup is no exception!). But this outgrowth of IT services complicates work and multiplies the risk of data leaks.
Inefficiency and waste of time
1. Tools don’t connect so data is uploaded to multiple places and employees lose track of what is where2. More different services means more frequent service disruption (and discontinued services!) blocking employees from working3. Each tool has a different user interface, requiring more of training and causing mistakes4. Nobody knows who has access to what tool and who manages which accounts5. The IT department loses track of the services and ends up paying for unused accounts
You thought that a breach in a non-critical online tool is low-risk?Guess what, the hacked passwords were re-used on critical company infrastructure.
Security risks
6. Uploading data to multiple platforms means multiplying the risk of a data breach7. Loss of visibility and ability to track where data is and who has access8. Complicated reporting on data breach causes compliance issues9. Central or connected authentication and storage means breach in one is breach in all10. Password re-use by employees across platforms means even a breach in a low-risk service risks all
Now what?
Of course, just eliminating all these systems is no solution. Your teams need to get work done and employees will resort to these online tools, even if you don’t allow, sanction or manage it. Illicit use of private accounts consumer clouds by employees are one of the major causes of data leaks. And a study by Veritas Technologies shows the wild growth in cloud services multiplies the cost of ransomware attacks, so reducing the number of clouds where your sensitive business data is floating around in is paramount.
Frequent audits of the use and number of accounts on public cloud services, as well as policies, training and supervision over password use and what gets uploaded where is important. But ultimately, those are work-arounds that rely on employees never making mistakes!
Only consolidating the many cloud solutions can solve the root cause. An on premise, extensible and infrastructure-integrated solution that can not only fulfill the tasks of dozens of cloud services but does that in a single, unified and easy to use interface means improved productivity and reduced risk. Try Nextcloud Hub today.
Anfang 2025 begannen US-Hyperscaler, in einer großen PR-Kampagne neue „souveräne Cloud“-Angebote in Europa zu bewerben. In den letzten Wochen ist ihr Narrativ jedoch in sich zusammengebrochen. Es sind nicht die Kritiker, die die Widersprüche aufdecken – die Technologieunternehmen selbst haben zugegeben, dass ihre „souveränen” Versprechen heiße Luft sind.
Nextcloud ist die erste Cloud-Plattform, die mit dem Umweltzeichen „Blauer Engel“ ausgezeichnet wurde und damit beweist, dass eine digital souveräne und grüne IT möglich ist.
Unternehmen, ob klein oder groß, brauchen eine Möglichkeit, die Ausfallsicherheit und digitale Souveränität ihrer Abläufe zu gewährleisten - eine Open-Source-Alternative zu Teams, die die Privatsphäre respektiert. Und heute stellen wir diese Lösung vor - Nextcloud Talk.
Bechtle und Nextcloud kündigen heute eine vollständig verwaltete Kollaborationsplattform für den öffentlichen Sektor an, die keiner Ausschreibung bedarf und sofort bereitgestellt werden kann.
Our mission is to help individuals, businesses and organizations achieve digital sovereignty and regain control over their data. Nextcloud Hub 5 marks a massive step forward towards achieving this mission, putting the power of AI into your hands – in a way that keeps you in control. New release, new possibilities Hub 5 builds on […]
The countdown is on. On September 27 and 28 we are meeting up in Berlin, Germany, for the annual Nextcloud Community Conference 2025. Get ready for two full days of workshops, talks, and networking with contributors, developers, and open source enthusiasts from around the world. Do you want to deepen your technical skills? Explore the […]
With the EU law proposal “Regulation to Prevent and Combat Child Sexual Abuse” — more commonly know as the EU Chat Control Law — our democracy is threatened from the inside: by our own governments. Citing child protection as the reason, the EU wants to backdoor end-to-end encryption, so they can access and read any […]
Join our workshops on September 27 and 28 as we come together in Berlin, Germany, for the Nextcloud Community Conference: a weekend of connecting, sharing, and building together. This year, we’re excited to bring you a series of hands-on workshops designed to help you sharpen your skills, explore new ideas, and collaborate with experts. From […]
Wir speichern einige Cookies, um Besucher zu zählen und die Nutzung der Website zu erleichtern. Diese verlassen unseren Server nicht und dienen nicht der Verfolgung Ihrer online-Aktivitäten.
Weitere Informationen hierzu finden Sie in unserer Datenschutzrichtlinie. Anpassen
Statistik-Cookies sammeln anonym Informationen und helfen uns zu verstehen, wie unsere Besucher unsere Website nutzen. Wir verwenden cloud-gehostetes Matomo
Dienst:Matomo
Cookie-Beschreibung:
_pk_ses*: Zählt den ersten Besuch des Benutzers
_pk_id*: Hilft, die Besuche nicht doppelt zu zählen.
mtm_cookie_consent: Erinnert daran, dass der Nutzer seine Zustimmung zur Speicherung und Verwendung von Cookies gegeben hat.
Cookie-Ablauf:_pk_ses*: 30 Minuten
_pk_id*: 28 Tage
mtm_cookie_consent: 30 Tage