One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1155
Date de publication 2016-05-03 13:00:00 (vue: 2016-05-03 13:00:00)
Titre 5 Cloud Security Mistakes That Could Cost You
Texte By now, most businesses realize that the cloud is here to stay. Once considered little more than a fad, it’s become increasingly clear that businesses that fail to adopt the cloud in some form are missing out on opportunities for growth, increased productivity, and, in many ways, improved security.However, using the cloud is not without risk, and many organizations make mistakes that could lead to costly data breaches if they aren’t corrected. Following are 5 cloud security mistakes that could cost you:1. Storing Sensitive Data on Unsecured ServersAs more companies adopt cloud storage and application solutions and see the benefits that come with doing so, the temptation is great to move everything to the cloud. And there are some distinct advantages to doing so. Greater flexibility for your workers in terms of where and when they work, increased productivity, and improved business continuity in the event of a disaster are all compelling reasons to shift to a cloud-based environment. Unfortunately, though, many companies move data to the cloud without fully evaluating the security risks of doing so. Certain types of data, such as that protected by federal and industry regulations, legal documents, confidential business development data, and other identifying data (such as employee and customer records) must be kept as secure as possible.Because not all cloud servers are created equal in this regard, it’s important that such data only be stored on cloud servers that meet stringent security guidelines. In other words, using a free or rock-bottom cheap cloud service provider to store all of your company data is likely a recipe for disaster.2. Not Controlling Access to the CloudOne of the primary benefits of the cloud is also its greatest possible weakness. The fact that cloud servers can be accessed from virtually anywhere, by anyone with the proper credentials, makes it convenient - but it also makes it vulnerable.Controlling access to data stored on the cloud is often a difficult balancing act between giving people access to the tools and information they need to do their jobs and keeping data from falling into the wrong hands. Overly restrictive environments keep data safe, but at what cost?Effectively managing data requires a comprehensive policy that not only controls who can access what data and from where, but also includes monitoring to determine who accesses data, when, and from where to identify potential breaches or inappropriate access. At the very least, you must educate employees on how to secure their cloud sessions, which includes avoiding public networks and effective password management.3. Not Maintaining the Cloud Via Backups and PatchesBusiness continuity in the event of a disaster is one of the primary benefits of the cloud. For instance, if your network falls victim to a hacker, the backup data in the cloud allows you to remain operational while you undo the damage.However, if you don’t maintain your cloud servers with regular data backups, patches, and updates, you could be creating an entirely new vulnerability. Hackers often work by exploiting vulnerabilities, and if you don’t mitigate these vulnerabilities, you’re at risk of an attack. Often, not keeping the cloud updated stems from concerns about cost or downtime, but consider that the cost of such maintenance is far less than that of a breach. And given that many cloud service provid
Envoyé Oui
Condensat about access accessed accesses act adopt advantages agreement all allow allows also always and/or any anyone anywhere application are aren’t attack avoiding backup backups balancing based because become benefits between both bottom breach breaches business businesses but can center certain chance chances cheap choose clear cloud cloudone come companies company compelling comprehensive concerns confidential consider considered considering contain continuity controlling controls convenient correct corrected cost costly could created creating credentials customer cybercriminals cybersecurity damage data determine devastating develop development devices difficult disaster distinct documents doing don’t downtime during educate effective effectively emails employee employees encryption entirely environment environments equal evaluating even event everything exploiting fact fad fail fall falling falls far federal flexibility following form free from fully given giving going great greater greatest growth guidelines hacker hackers hands have here highest how however identify identifying important improved inadvertent inappropriate includes increased increasingly industry information instance isn’t it’s its jobs keep keeping kept lead least legal less likely little located lock lost maintain maintaining maintenance majority make makes making management managing many measures meet missing mistake mistakes mitigate monitor monitoring more most move must need network networks new not now occur offer often once one only opening operational opportunities organizations other out overly part password patches patchesbusiness people physical physically place plan policy poor possible potential prevent prey primary private productivity proper properly protect protected protocol provider providers public realize reason reasons recipe records reduces regard regular regulations remain remember remotely render requires restrictive risk risks rock safe secure secured security securityfinally see sensitive servers serversas service services sessions shift site solutions some sort standards standardseven stay stem stems stolen storage store stored storing stringent such temptation terms than them there’s therefore these though tools transmission trojans types unauthorized undo unfortunately unsecured updated updates use useless using vast vendors very victim virtually vulnerabilities vulnerability vulnerable ways weakness what when where which who wipe without words work workers world wrong you’ll you’re you:1 your
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: