Apps, we all love ’em, we all use ’em, and we’re all leaving the enterprise more exposed than the albino beach backside of a Coppertone ad model.

Recently, Business Insider posted the top 50 iPhone apps that employees are subversively leveraging within the corporate firewall despite fervent emails from IT and general dismay. Ranked order of most to least used, here are the top 10:

  1. Facebook
  2. Dropbox
  3. Google Mail
  4. Apple iCloud
  5. LinkedIn
  6. Disqus
  7. Salesforce
  8. Amazon Web Services
  9. Hotmail
  10. Box

Let’s assume for a moment that completely ignoring your IT department’s security concerns is a forgivable practice. Let’s also assume that no one has ever added files with sensitive information to Facebook when we meant to instead post pictures of a great pair of shoes or a cool car. What’s most alarming in this list? I’ll give you a hint: focus on the ones I’ve italicized.

Apps that cause IT apoplexy

corporate appsThe problems in this scenario are many; adding sensitive corporate material to Facebook is a faux pas of egregious proportions. At the end of the day, while it is plausible, it’s a slim chance scenario.

What should give any CIO or CSO worth their salt cause for concern are the gigabytes of data being thrown into the cloud with reckless abandon via consumerized file apps like Dropbox, iCloud, Amazon and Box.

Sure, these sites require passcode authentication, but as we all know one keystroke logger can send that Fort Knox crumbling to the ground. I wonder how many people actually log out of these apps…ever? Not often, which means anyone who grabs their mobile device (be it family or foe) has immediate access to a plethora of corporate brain trust.

Wrap that app! Or at least manage it

So what is one to do with those partaking in shenanigans on non-permissioned apps? Lack of visibility, especially in a mobile environment, is no longer an acceptable excuse. With mobile app management (MAM) solutions, IT is granted vision into every app across the enterprise, and yes this includes those brought along in accordance with a bring your own device (BYOD) program.

If employee privacy concerns arise in face of BYOD, supplementing mobile device management (MDM) with MAM can let IT and mobility business partners at the department level dictate the documents that may or may not be shared.

Basically, there are options when it comes to apps. Depending on your specific security needs, you might want to leverage the panacea of security with containerization, but that might also be overkill. At the very least you should have visibility and management before your entire enterprise is uploaded for the world to see.