As more and more organisations embrace cloud technology, protection against cybercrime, data breaches and other security threats is essential. Especially as cybercriminals are innovating rapidly supported by the latest tech.

Indeed, in 2019, automated “vulnerability search engines” continually probe the internet for exploitable weaknesses to attack. And it’s not just lone hackers we have to worry about. Today, many cybercrime syndicates are evolving from existing criminal structures.

Your data is precious

The ability to harness big data leads to improved performance at all levels. As such, many businesses are leveraging the cloud to extract quantifiable value from big data. So, it won’t be long before the majority of organisations move all (or most) of their data to the cloud.

But, in January this year, 1.8 billion records were leaked online[1]. And, if this data is sold on the dark web and exploited by cybercriminals, the results could be devastating – both for the data subject and the organisation that failed to protect it.

The weakest link

Despite the fear of cybercrime, the greatest security risk may still come from your own people. So, “stop and think” behaviour must become part of your firm’s data security culture. This requires a focus on day-to-day habits alongside robust processes to reduce the threat.

Cloud security is essential

With the number of connected devices expected to rise to 20 billion by next year[2], organisations are right to be worried about increased vulnerability. So, ensuring adequate cybersecurity must now be a critical priority. And, defending cloud infrastructure from compromise is a vital part of this.

This includes things like:

  • Ensuring best-practice security configuration
  • Investing in security skills and data protection training
  • Deploying tech to defend against tech (e.g. antivirus software, encryption and anti-spoofing controls such as DMARC, SPF and DKIM)
  • Implementing a ‘Clear Desk and Screen’ policy (and ensuring your employees abide by it)
  • Securing communications platforms with end-to-end encryption
  • Hardwiring all devices for security
  • Incorporating processes that continuously check for vulnerabilities and data infringements
  • Using two-factor authentication for exposed services
  • Reviewing where your most sensitive data lives, and assessing your access and sharing privileges
  • Preventing employees from installing unauthorised software onto their work devices to avoid the risk of malware, ransomware etc.
  • Conducting device threat assessments
  • Making sure you have the ability to remove sensitive data from devices remotely quickly (e.g. via a hosted desktop)
  • Storing your data in ISO-accredited data centres
  • Regularly updating operating systems are apps.

Crucially, when you work with a cloud provider, you must ensure that they understand the risks. And that they know how to deploy solutions that reduce unnecessary exposure. In fact, they should be willing to specify the security measures they will guarantee as part of your SLA.

Is the cloud your most significant security threat?

Not at all. In fact, despite the headlines, in almost all cases, hacks are down to a poorly designed and maintained security systems. Not the weakness of the cloud.

Indeed, data security is better in the cloud. With public cloud infrastructure-as-a-service workloads expected to suffer at least 60% fewer security incidents than those in traditional data centres[3].

At Cloud Geeni, our cloud solutions offer the highest levels of security and compliance. With robust backups and stringent security management. For more information on how we can help your business, contact us today for an informal chat.


[1] Clearswift

[2] Gartner

[3] Gartner