How to secure the cloud

Posted by John Ryan
on 23-Nov-2018 11:09:14

In a world of predators, you need to master your survival skills. No one implementing cutting-edge cloud technology can afford to ignore security. It is the main barrier to cloud adoption. Already, 27% of IT security budgets are allocated to cloud security and this is estimated to reach 37% in the next 12 months.

97% of organisations use some type of cloud service either public, private and more frequently hybrid – up from 93% a year ago. Trust in the cloud is growing - now 69% of users trust the public cloud to keep their sensitive data secure.

cloud hubspot

So how do you secure the cloud?

Below is a few of the key cloud security areas that need to be examined and how best to do this.

  1. Protect SaaS applications from external threats

SaaS applications deliver many benefits to businesses but also expose them to risks from advanced threats. This is mainly due to unauthorised access to corporate SaaS accounts. All businesses need a solution to prevent cyber criminals from accessing and hacking SaaS applications and protection against the most sophisticated malware and zero-day threats.

  1. Secure your email

The secure email system is possibly the hardest of all cloud security. There are so many areas to cover but you must:

  • Ensure that malware, viruses and spyware are neither received nor sent within email or attachments
  • Minimise spam, scams, phishing expeditions and illegal content
  • Ensure staff, neither accidentally nor with malicious intent, permits or sends confidential, sensitive or illegal content

Organisations should provide an email usage policy to reduce staff misuse of email. This also provides you with some redress for when it is misused.

  1. Data sharing

To avoid putting the business in danger of losing or compromising sensitive corporate data, organisations must provide a secure and easy-to-use file sharing and data storage solution. This will enable staff exchange large files with clients, colleagues, contractors and third parties from any computer or mobile device.

  1. Mobile security

BYOD anyone? If you do encourage employees to use their own mobile devices, you need a BYOD policy. Additionally, many organisations provide mobile devices that permit roaming access to corporate email and so it may be undesirable to hold sensitive messages on these devices. In order to avoid this, businesses should implement a filter to control which messages can be synchronised to a mobile device. Filtering based on security labelling prevents sensitive information from being exposed to mobile devices.

  1. Know where sensitive data is stored

Organisations need to identify the location of sensitive data. You should capture and identify assets on networks, shares, SANs, in databases and email systems and in transit. It is wise also to also identify data owners and most common data users in order to assist with securing your cloud applications

Zinopy works with a number of partners including Check Point and IBM to help you secure the cloud. Zinopy also provides a Risk Assessment service to identify the location of your sensitive data.

Topics: Security

Written by John Ryan

John Ryan has over 25 years’ experience in the IT industry gained in high profile roles in the IT Security market with Entropy, Calyx and as founder and CEO of Zinopy. He has a breadth of technical experience in all areas of networking and security, with a particular focus on data security and enterprise risk management. John is a regular speaker at industry events.
Find me on:

Zinopy Blog

Zinopy is the trusted workspace virtualisation and information security specialists, and Ireland's leading Citrix Specialist Platinum partner.

Subscribe to our blog for expert views and valuable industry advice and learn how to address your key cyber security and workspace virtualisation challenges.

Subscribe Here!

Recent Posts