Business must do more to limit exposure of data in the cloud

February 2019 IT infrastructure, Cyber Security

Organisations should pay closer attention to security concerns associated with storing data in the cloud as configuration errors together with cloud threats pose a significant and ever-increasing risk to enterprise data, says Nompumelelo Mdima, McAfee Business Development Manager at Axiz Advanced Technologies.

Nompumelelo Mdima.
Nompumelelo Mdima.

“While cloud services offer business the advantages of scalability, business continuity, collaboration efficiency and flexibility of work practices, it is equally important to appreciate that data in the cloud is more exposed than many organisations realise,” notes Mdima.

According the most recent Cloud Adoption and Risk Report released by McAfee, nearly a quarter of the data in the cloud can be categorised as sensitive, putting an organisation at risk if it is stolen or leaked. The report also revealed that the sharing of sensitive data with an open, publicly accessible link, increased by 23% year-on-year. In addition, the average enterprise experiences more than 2200 misconfiguration incidents per month in their infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) instances.

Mdima says the data highlights the need for business to deploy cloud security solutions that span the entire cloud spectrum as cloud service providers only cover the security of the cloud itself, not customer data or customer use of their infrastructure and platforms. “It is imperative that business adopt a cloud strategy that includes data loss protection, configuration audits, and collaboration controls to properly protect their data. Not doing so also has consequences through noncompliance with internal and external regulations.”

Organisations need to first understand which cloud services are in use, which data is sensitive, and how it being stored and used as a first step to mitigating risk. “Armed with a clear and coherent overview, suitable security policies can be put in place to prohibit sensitive data from being stored in unapproved cloud services and guard against noncompliant sharing of data via email or through a publicly accessible link,” says Mdima.

The McAfee report, which analysed billions of events in anonymised cloud use, also found that most threats to data in the cloud result from compromised accounts and insider threats. “A sound security policy should also have protocols for identifying irregular behaviour, for instance when a user accesses the cloud from separate locations simultaneously, so that a comprised account can be dealt with immediately,” adds Mdima.

“In order accelerate their business, organisations should look to cloud-native and frictionless ways to defend against security threats. Proactively addressing security responsibilities before there’s an incident remains the best way mitigate risk and safeguard what is very often a company’s most valuable asset – its data.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Edge computing ? drivers and benefits
September 2019 , IT infrastructure
Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source.

Read more...
Advanced connectivity enables fast and flexible networks
September 2019, Ruckus Networks , IT infrastructure
Advanced networking is the unsung hero of our digital future, offering a continuum of connectivity that can drive the development of new products and services and transform operating models.

Read more...
A platform approach to innovation and value
September 2019, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
Moving to the platform model of doing business holds tremendous advantages for end users and smaller developers, but also for the whole technology supply chain.

Read more...
Selecting the right surveillance storage
September 2019, Capsule Technologies, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, IT infrastructure
Storage is an integral part of a surveillance installation and the solution chosen can make or break the success of your project.

Read more...
The NUUO storage solution
September 2019, Forbatt SA , CCTV, Surveillance & Remote Monitoring, IT infrastructure
A stable NVR should maintain a consistent data throughput unaffected by user actions such as querying or playback.

Read more...
Cyber-securing your surveillance infrastructure
September 2019, Genetec, Hikvision South Africa , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
When it comes to cybersecurity, understanding the risks and the solutions as well as engaging in open communication helps everyone.

Read more...
Keeping your things to yourself
October 2019, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Three experts spoke to Hi-Tech Security Solutions to offer advice on keeping your IoT working for you and not for cyber criminals.

Read more...
IoT in security
October 2019, Duxbury Networking, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Using the Internet of Things is not really optional these days, but securing the Internet of Things is compulsory, no matter what industry you operate in.

Read more...
The future of connectivity in South Africa
September 2019 , IT infrastructure, Products
Next-generation technologies will drive real transformation in companies. Organisations across all industries must prepare to enter the next phase of the digital future, says Matthew Hall, product director at Rectron.

Read more...
Updated NAS from Synology
September 2019 , IT infrastructure, CCTV, Surveillance & Remote Monitoring
Synology has released the latest update of DiskStation Manager, featuring a series of new functionalities that optimise user navigation and enhance system performance.

Read more...