Watch Wimbledon Tennis Tournament Online

THE TOP 5 CLOUD SECURITY THREATS YOU NEED TO WORRY ABOUT

Cloud Security Threats

Cloud computing is clearly here to stay, and has become an integral part of any business computing strategy. For many businesses, the power, flexibility, and convenience of cloud applications outweigh the security risks — but that doesn’t mean that the concerns about security have gone away.

In fact, cloud security still faces a number of significant threats that all businesses of any size need to be concerned about. Any one of these risks can lead to devastating consequences, so it’s important not to fall into a false sense of security because nothing has gone wrong yet. Being aware of these threats, and employing robust cloud security solutions for protection, is important for keeping your business operational while protecting sensitive data.

1. Data Breaches

We see the headlines all the time: The personal information of millions of consumers exposed by a data breach. However, those large-scale breaches are actually only the tip of the iceberg when it comes to stolen data. While stolen personal information is certainly worthy of concern, other types of data exposed in a breach, including trade secrets and intellectual property, can be just as, if not more, devastating, to a business. In any case, a data breach is costly, both in terms of fines and sanctions for the exposure of protected data, as in costs related to brand damage, lost revenue, investigations, and recovery.

So why is this so relevant to the cloud? Well, because the cloud has become an increasingly attractive target for hackers due to the sheer amount of data that it contains — and the somewhat more lax security guidelines that many companies follow when protecting that data. Many companies believe that their security providers are responsible for providing security — and most do — but at the end of the day, any company using the cloud is responsible for their own data protection, no matter what that may look like. Otherwise, they run the risk of falling victim to a breach.

2. Data Loss

Data Breach Comic

Data loss differs from a data breach in that a breach is the result of a malicious action that exposes data to individuals who aren’t authorized to see or use it, while data loss means that data is literally lost — deleted, erased, etc.—without having a backup. Sometimes data loss occurs due a technical error, a lost encryption key, or even in some cases, a deliberate act. Regardless of the cause, data loss can prove costly, and it’s of paramount importance for companies to protect their cloud data against irretrievably lost data.

3. Malicious Insiders

Recently, the Department of Homeland Security revealed that the greatest risk to data security isn’t outside hackers, but actually insiders — employees, contractors, etc. — who deliberately put their employer’s data and networks at risk. Individuals with access to your network and the right administrator privileges can easily manipulate data, harm infrastructures, or otherwise delete or render data unusable.

It’s important to note that all employee mistakes are not deliberate attacks — sometimes, a simple error can cause harm — but that only underscores that point that your company needs to take care prevent any one person from having the ability to take down your network. Logging and monitoring administrator privileges and access, maintaining appropriate separation of duties, encryption controls, as well as training employees to avoid costly mistakes, is an important part of cloud security.

4. Account Hijacking

Cloud services must be protected against phishing, fraud, and software exploits like any other network. Because data is being transferred to the cloud can be eavesdropped on, allowing hackers to manipulate data and transactions, it’s important to keep cloud services safe from hijacking. Do not allow users to share credentials, require two-factor authentication when available, and utilize monitoring tools to ensure that all transactions can be monitored and authenticated.

5. Advanced Persistent Threats

Advanced Persistent Threats (APTs) are among the most dangerous threats because they move through networks stealthily and mimic other traffic, making them difficult to detect. They also generally come in via undetectable methods, such as spear phishing attacks or peripherals pre-loaded with malware. However, these attacks are highly dangerous, and your company needs to invest in advanced security and training to keep them from infiltrating your network.

As the cloud matures and more businesses take advantage, so will the need to focus more on strategic decisions regarding security. The first step is understanding the major threats facing the cloud — and focusing your efforts on protecting against them.

By Glenn Blake

CloudBuzz

The latest in curated technology related news collected from many of the leading news distribution, industry research and technology vendor firms on the planet.

Here you will find recent news sources from companies such as Reuters, Marketwired, IDC, Gartner or directly from cloud vendors such as Google, Microsoft or Amazon.

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
RSA Conference: FUD-free or filled?

RSA Conference: FUD-free or filled?

IoT 15 Billion Units By 2021 At the annual RSA conference, there were plenty of discussions and presentations on the ...
The Path to the Cloud: A Look at Different Approaches to Cloud Migration

The Path to the Cloud: A Look at Different Approaches to Cloud Migration

Different Approaches to Cloud Migration The public cloud has gained considerable momentum this past decade. Concerns about cost and security ...
6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications Although associated with the virtual currency bitcoin, blockchain technology can be applied across multiple industries, and it ...
Who Leads Digital Transformation? Historically, It Was The CIO

Who Leads Digital Transformation? Historically, It Was The CIO

Who Leads Digital Transformation? On my way to the office last week, I was stopped at a stoplight that only ...
Top Security and IT Priorities for 2017

Top Security and IT Priorities for 2017

Top Security Priorities By 2019, cybercrime is expected to cost businesses over $2.1 trillion globally according to Juniper Research. Needless ...
Palo Alto Networks Commitment to Educating European CEOs and Boards on Cybersecurity as a Business Issue

Palo Alto Networks Commitment to Educating European CEOs and Boards on Cybersecurity as a Business Issue

In recent years, the topic of cybersecurity awareness, education, training, and skills has grown in importance across the European Union. On each trip I take to Brussels, I am struck by how this is a ...
AT&T Unveils $15-a-Month Video Service

AT&T Unveils $15-a-Month Video Service

Wireless company’s fees for programmers would depart from industry practice AT&T Inc. T -1.20% on Thursday unveiled a new video service, called WatchTV, that aims to use a “skinny bundle” of channels to recapture some ...
Teradata sues Germany's SAP, alleging it stole trade secrets

Teradata sues Germany’s SAP, alleging it stole trade secrets

FRANKFURT (Reuters) - SAP SE, Europe’s most valuable technology company, was sued on Wednesday by U.S. company Teradata, which accused it of stealing trade secrets, copyright infringement and anti-trust violations. The case, filed at the ...