As more and more businesses migrate from on-premise to cloud hosting, and with GDPR legislation now in place, it’s important that cloud users are able to store their data as securely as possible.
In a recent webinar, experts in cybersecurity and cloud hosting discussed the most prominent threats to cloud, and provided valuable advice on how these can be minimised.
So, how do you keep your cloud and your business as safe as possible? Here are our four favourite questions and answers from the webinar.
In a word: Yes. Hosting companies have access to large teams with specialised knowledge and skills, and highly protected facilities, dedicated to keeping infrastructure secure on a daily basis. But, not all providers are created equal so it’s important to ask the right questions and know what’s best for you and your business.
Cloud is brilliant at giving businesses opportunities that they wouldn’t otherwise have, like scaling abilities and resources, but, unfortunately, as soon as you connect your solution to the internet it becomes a target for attackers.
In recent years, we have seen an increase in attacks on Software as a Service (SaaS), where software and web applications are provided and accessed by users through the cloud.
Software and web apps have been described as the ‘soft underbelly’ of cloud solutions, which is unsurprising, considering that web applications have been the primary target of more than 70% of all attacks this year, so far.
Cloud itself is a complex and ever-changing environment, and the recent increase in the number of ‘points of entry’ to our networks, thanks to apps and IoT devices, is posing a significant risk to security. IoT is known to be notoriously insecure and, in 2017 alone, we saw a 31% increase in published software vulnerabilities.
There are so many connection points into a network which present risks that business owners don’t think about – you are only as secure as the weakest point of your network.
As one of our experts pointed out; the majority of cyber-attacks start with people and poor employee security plays a part in forming these ‘weak points’.
We urge businesses to think about how employees are using software at home and what devices they are connecting to work networks. Access management and employee security training are also crucial; only let people access things on a least privilege basis and simulate attacks, such as phishing, to train people to spot threats.
93% of cyber-attacks last year could have been prevented, and there are several security habits you and your business can start to employ.
In conclusion, your cloud is only as secure as you and your provider make it, so, take responsibility for cybersecurity within your business and choose the right cloud hosting provider to support you.
If you want to know more about security in the cloud, watch our FREE on-demand webinar