24 July 2017

Cloud Security Trends

If you’re one of the millions of businesses worldwide benefiting from cloud computing’s agility and accelerated time to market, it is likely that you deeply considered the best way to protect your cloud-based data before making the move. Transitioning from a traditional IT environment to cloud computing is an eye-opening experience for many, largely due to the rapid evolution of the cloud.

Combine this evolution with multiple cloud providers, several SaaS providers, shared responsibility, and mission critical implementations, and you’ll need a compass to find your way home. How do you stay ahead of cyber attacks as advancements in cloud computing continue to progress? We’re keeping you in the loop with a few of the top trends and predictions for cloud security.

It was the best coach I’ve ever had!

Mark Johnson, Google

Increased Vulnerability for the Internet of Things The booming IoT industry presents a world of innovation waiting to be unsettled by persistent cyber attackers. A rapid solution is necessary, as a report conducted by Ericsson estimates 16 billion IoT connected devices by 2021 (scaling back from a 2010 prediction of 50 billion by 2020). Industries such as manufacturing and healthcare are utilizing IoT devices regularly, creating a more critical need for a cloud security solution in 2017. Genpact Research Institute reported, “31% of IT executives say data concerns are delaying IoT adoption.” A current lack of standards, patching, links across IT and operational systems, devices shipping with security gaps, user error, privacy concerns, and links to big data will keep the industry busy in 2017.

Accountability for Shadow IT Without proper guidance, Shadow IT is commonly overlooked, enabling tremendous security gaps. Cloud security will continue to become more complex in 2017, meaning flawless internal IT operations are imperative for cloud security. This will be a difficult task, but our Principal Cloud Engineer has tips for staying ahead of Shadow IT.According to a 2016 VMWare survey, the consequences of Shadow IT are increased stress on IT personnel and resources (59%), as well as more difficulty preventing cyber-attacks (73%). As traditional working structure evolves, the blurred line between office and home technology fuels Shadow IT issues. We suggest kicking off 2017 in style by taking full inventory of all work-related devices used by your employees.

Tighter Security Regulations for Employees Let’s face it: Cloud security transformation is tough to navigate. It’s more problematic when your employees are uneducated about security best practices. Whether it is due to a disgruntled ex-employee or an honest mistake, one of your largest security risks is your team of employees. To combat negligence, Ponemon Institute’s report, Managing Insider Risk through Training and Culture, suggests creating a culture of security by providing incentives for protecting sensitive information or reporting potential issues. The report included responses from 601 individuals at companies with a data protection and privacy training program (DPPT), which appear to improve data security by 51 percent. They found 66 percent of respondents believe employees are the weakest link when creating a strong security stance, and 55 percent said their organization had suffered a security incident or data breach due to a malicious or negligent employee.