Cloud changes everything

1 January 2014 Security Services & Risk Management

As technology evolves to assist enterprises to become more productive, secure and resilient against trending security threats, so does the strategies and techniques of cyber attackers to exploit the vulnerabilities within these solutions. In 2013 we have seen a number of cyber attacks in the form of malware and phishing which is primarily aimed at sourcing and harvesting information from enterprises to be used for corporate espionage.

Heino Gevers, security specialist at Mimecast.
Heino Gevers, security specialist at Mimecast.

Similar to enterprises that exploit cloud-based technology for its ability to process, analyse and store information on a much greater scale than any on premise solution could, so would cyber attackers use similar approaches to deploy targeted attacks on enterprises at a much bigger scale which will result in larger financial losses and longer lockdown periods in 2014. The widespread adoption of cloud solutions by organisations will see the focus of cyber attackers shift to cloud service providers, especially where big data solutions are offered. Therefore we should find in 2014 there will be more stringent regulations and controls whereby enterprises can validate the authenticity, credibility and level of security by cloud service providers.

There will also be a big focus on POPI and organisations changing their technology roadmap for 2014 to ensure they are aligned to the POPI Act requirements in terms of protecting and storing data belonging to that of their users and customers alike, but also making that information available to them on request. Therefore organisations not only have to combat cyber attacks in order to protect their own company IP, but also to protect the private information belonging to that of their customers and users. This is going to be an enormous challenge for organisations as they are struggling already to find solutions to accommodate BYOD strategies and soon legislation will require them to protect and store the very same information these devices were designed to exploit from anywhere at any time.

Organisations will simply have to start taking a centralised approach towards processing, managing and storing information. The more platforms there are hosting or processing their company information, the more exposed and at risk they are. This is a result of data fragmentation which can occur either on premise or in the cloud and by finding a solution to this challenge first, organisations will simply need to secure one repository as opposed to multiple point solutions. This repository will need to be able to scale infinitely and allow access to information in a secure environment.

Due to the widespread adoption of cloud-based services, we also should see a number of new data migration tools coming about in 2014 which will aid organisations with the export and conversion of their 'big data' to a proprietary format in order to be imported by the cloud service provider.

For more information contact Mimecast SA, +27 (0)11 555 5461, www.mimecast.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Risk management and compliance enforcement
Security Services & Risk Management
Having a risk management and compliance programme (RMCP) is not just a procedural formality; it is a legal requirement under Section 42 of the Financial Intelligence Centre Act (FICA).

Read more...
The dangers of poor-quality solar cables
Security Services & Risk Management Smart Home Automation
Reports indicate that one in six fires attended by South African firefighters is linked to substandard solar installations, often due to faulty wiring or incompatible components.

Read more...
Growing risks for employers
Security Services & Risk Management
With South Africa’s unemployment rate exceeding 32% and expected to rise beyond 33% this year, desperation is fuelling deception in the job market. Trust is no longer a given, it is a gamble.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Growing risks for employers
Security Services & Risk Management
With South Africa’s unemployment rate exceeding 32% and expected to rise beyond 33% this year, desperation is fuelling deception in the job market. Trust is no longer a given, it’s a gamble.

Read more...
Managing mining physical security risks
Zulu Consulting Security Services & Risk Management Mining (Industry) Facilities & Building Management
[Sponsored] Risk-IO, a web app from Zulu Consulting, is designed to assist risk managers in automating and streamlining enterprise risk management processes, ensuring no steps are skipped and everything is securely documented.

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.