The Crucial Role of Cloud Security: Insights & Reasons You Shouldn't Overlook (ZDNet)
The Crucial Role of Cloud Security: Insights & Reasons You Shouldn’t Overlook (ZDNet)
Image: Getty
As convenient as cloud computing has become , it isn’t without problems. Poor cybersecurity planning for cloud applications, such as allowing users to rely on simple passwords, failing to use multi-factor authentication or not applying patches and updates , can leave you vulnerable to attacks.
Special Feature
Managing cybersecurity was already a challenge for many organisations and their boardrooms : adding the cloud just widens the potential threat surface and increases the complexity for many.
That’s especially the case for firms that might not even be aware of their cybersecurity responsibilities when it comes to cloud services.
“Sometimes we still have a perception by organisations that it’s a set-and-forget-it mentality,” says Jason Nurse, associate professor in cybersecurity at the University of Kent.
“The reality is that, for many organisations, they view using the cloud as sort of handing over all responsibility on security and data protection,” he adds.
ZDNET SPECIAL FEATURE: SECURING THE CLOUD
- Cloud computing dominates. But security is now the biggest challenge
- Cloud computing security: Where it is, where it’s going
- Cloud computing security: Five things you are probably doing wrong
- Don’t let your cloud cybersecurity choices leave the door open for hackers
But, he points out, a lot of responsibility still falls on these organisations to do things to ensure that they have the right setup, to ensure that they have the cloud configured correctly and that they don’t have data “hanging around” that’s not appropriately protected.
The lack of understanding around configuring and securing cloud services can leave sensitive information exposed – potentially even directly to the open internet where anyone , including malicious cyber criminals, can see it.
This isn’t just a theoretical problem, as cases of misconfigured cloud environments exposing sensitive information are regularly uncovered.
ZDNET Recommends
“Organisations do not completely understand the cloud environment and a lack of expertise and skill set makes it difficult for businesses to identify and implement the right set of security controls to protect their cloud operations,” says Prakash Venkata, principal within PwC’s cybersecurity, risk and regulatory practice.
“Companies that seem to be ignoring cloud security altogether may be doing so due to a lack of understanding, a lack of skills and expertise, limited time due to competing corporate initiatives, or limited budget to invest in leading tools,” he adds.
Security
- The best VPN services of 2024: Expert tested
- How to turn on Private DNS Mode on Android (and why you should)
- The best antivirus software and apps you can buy
- The best VPN routers you can buy
- How to find and remove spyware from your phone
But cloud security isn’t something that can just be ignored – if your organisation is using cloud applications or servers, securing it is a must, particularly as cyber criminals and other malicious hackers are on the lookout for insecure services they can exploit to gain access to networks with relatively low effort.
SEE: Cloud computing security: New guidance aims to keep your data safe from cyberattacks and breaches
For example, there’s been a big rise in enterprises and employees using cloud application suites for emails, managing documents and other daily tasks. It’s beneficial for employees, but if those accounts aren’t secured properly, they can provide an easy backdoor for attackers .
If your organisation isn’t on top of its cloud security strategy, it could be easy for the information security team to miss early signs of suspicious activity , only to finally notice when it’s too late, once information has been stolen or ransomware has encrypted the network.
There are also additional steps that information security teams can take to bolster cybersecurity defences of cloud services, such as rolling out multi-factor authentication to all users . This provides an opportunity to stop and detect malicious intrusions before they happen, because even if the attacker has the correct password, the user has to confirm that it’s a legitimate login attempt.
“Identity access management, the ability to ensure that networks’ data system services can only be accessed by by authorized parties, that’s really the essential bit,” says Nurse.
Cloud
- What is digital transformation? Everything you need to know
- The best cloud providers compared: AWS, Azure, Google Cloud, and more
- The top 6 cheap web hosting services: Find an affordable option
- What is cloud computing? Here’s everything you need to know
“Even considering the basic stuff, such as multi-factor authentication on key accounts and key services, I think those are the things that are more and more required broadly,” he adds.
SEE: Terrible cloud security is leaving the door open for hackers. Here’s what you’re doing wrong
And just because software is cloud-based, that doesn’t mean it doesn’t require security patches and updates. If there’s a security update available for cloud software, it’s best to apply it as soon as possible , particularly as cyber criminals also know about the vulnerabilities and will do their best to exploit them. For this, it’s important to select the right cloud vendor.
A good cloud service provider that becomes aware of security vulnerabilities in their products will roll out those patches to customers as soon as possible , providing the customer with the greatest opportunity to stay protected from attacks, using the exploit – as long as they apply the update on time.
However, your choice of cloud service provider could make a significant difference to your overall cloud security strategy. Many vendors will be responsive, quickly supplying updates and fixes for cloud software issues – but some aren’t, and it’s important to learn which these are before signing a contract.
“There’s no point choosing a cloud provider that has really cheap services, but then that cloud provider doesn’t patch regularly or doesn’t monitor its own attack surface, because at the end of the day, it’s still the organisation’s data that could be breached,” says Nurse.
Even when you have a cybersecurity strategy around cloud in place, that’s not the end of the journey – and much like when you first start using cloud services, you can’t just ignore it and hope for the best. Cybersecurity is always evolving, new threats emerge, and new strategies need to be applied to help keep networks and users as safe and secure as possible.
MORE ON CYBERSECURITY
- Hackers are using tech services companies as a ‘launchpad’ for attacks on customers
- Cloud computing security: New guidance aims to keep your data safe from cyberattacks and breaches
- Terrible cloud security is leaving the door open for hackers. Here’s what you’re doing wrong
- These researchers wanted to test cloud security. They were shocked by what they found
- Unsecured servers and cloud services: How remote work has increased the attack surface that hackers can target
Also read:
- [New] The Ultimate Guide to Thriving Amidst the World of Podcasts
- [New] Tips for a Pristine Image Canva's Background Technique
- 2024 Approved Unveiling Effective Metaverse Engagement Tactics
- Experience Next-Level Entertainment with Hitachi Ultra HD Smart TVs Featuring Roku Streaming
- In 2024, How to Turn Off Google Location to Stop Tracking You on Apple iPhone XS Max | Dr.fone
- In 2024, Unveiling LG’s Cutting-Edge Monitor Technology in Detail
- Reel In Viewers Mastery of Live 360 Video Broadcasts on Youtube
- Revamp Your Animated GIFs: Ultimate Cropping Solutions for Both Web & Desktop Applications
- Simple and Effective Ways to Change Your Country on YouTube App Of your Xiaomi Redmi A2+ | Dr.fone
- Stay Ahead on the Go: The Best Ways to Use Roku in Your Hotel or College Dorm Room
- The Definitive Guide to Google’s Podcast Submission for 2024
- The Updated Method to Bypass Vivo S18e FRP
- Top Screen Changers for Vivid Virtual Imagery for 2024
- Title: The Crucial Role of Cloud Security: Insights & Reasons You Shouldn't Overlook (ZDNet)
- Author: Donald
- Created at : 2024-12-14 00:17:07
- Updated at : 2024-12-21 05:03:18
- Link: https://some-tips.techidaily.com/the-crucial-role-of-cloud-security-insights-and-reasons-you-shouldnt-overlook-zdnet/
- License: This work is licensed under CC BY-NC-SA 4.0.