{"id":36407,"date":"2022-06-28T10:13:18","date_gmt":"2022-06-28T10:13:18","guid":{"rendered":"https:\/\/www.vmengine.net\/2022\/06\/28\/cloud-security-are-you-doing-it-all-right-here-are-5-things-you-maybe-get-wrong\/"},"modified":"2025-05-23T17:33:18","modified_gmt":"2025-05-23T17:33:18","slug":"cloud-security-are-you-doing-it-all-right-here-are-5-things-you-maybe-get-wrong","status":"publish","type":"post","link":"http:\/\/temp_new.vmenginelab.com\/en\/2022\/06\/28\/cloud-security-are-you-doing-it-all-right-here-are-5-things-you-maybe-get-wrong\/","title":{"rendered":"Cloud Security, are you doing it all right? Here are 5 things you (maybe) get wrong"},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_414 et_section_regular\" >\n<div class=\"et_pb_row et_pb_row_512\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_518  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_1915  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><em>&#8220;Safety first&#8221;.<\/em> With a slogan, this would be summed up, in the post-pandemic era and in the midst of a war with disastrous consequences in the heart of Europe, the digital arms race. Yes, because <strong>defending oneself<\/strong> is not only appropriate but also of vital importance for the thousands of companies that make the web their square.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1916  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Suffice it to say that today <strong>98% of companies rely on some form of Cloud-Based infrastructure<\/strong> and more than three-quarters of them, <strong>76%<\/strong> to be precise, have <strong>Multi-Cloud installations<\/strong>, consisting of two or more different service providers. These environments support business-critical applications along with sensitive data, both from customers and the company itself.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_465 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2022\/03\/29\/cybersicurezza-e-cloud-computing-la-grande-sfida-del-nostro-tempo\/\" target=\"_blank\">Cybersecurity and Cloud Computing: The Great Challenge of Our Time<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_515\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2022\/06\/cyber-A-2.jpg\" alt=\"\" title=\"cyber A\"  sizes=\"(max-width: 740px) 100vw, 740px\" class=\"wp-image-35242\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1917  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>What should be emphasized at all costs is that the so-called &#8220;<strong>Cloud transition<\/strong>&#8221; requires particular attention especially to security. Cloud-based applications must be protected from attacks by<strong> cyber-criminals<\/strong>, which are increasingly common and increasingly frequent, and unauthorized access to data located on the Cloud must be prevented, in line with current legislation.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1918  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>The ability <strong>to access the company portal from anywhere using cloud applications<\/strong> is convenient for employees, but it is also a potential new <strong>opportunity for cybercriminals<\/strong> who, with a series of stolen passwords, could access confidential information. There is also the prospect of hackers abusing cloud services to launch <strong>ransomware attacks<\/strong> and other malware campaigns.<br \/><strong>Mistakes<\/strong> <strong>to avoid<\/strong> to ensure that your enterprise cloud security strategy delivers <strong>an increase in productivity<\/strong> and<strong> protects users<\/strong> and your network from <strong>cyberattacks<\/strong> <strong>and incidents<\/strong>.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_466 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2022\/02\/09\/ransomware-conti-quando-la-prevenzione-informatica-protegge-letteralmente-i-tuoi-dati\/\" target=\"_blank\">Conti ransomware, when cyber prevention protects (literally) your data<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1919  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>We wanted to list<strong> 5 possible mistakes<\/strong> or missteps to <strong>avoid at all costs<\/strong>.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1920  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>1. Don&#8217;t Leave Cloud Accounts Exposed and Without Security Controls<\/strong><\/p>\n<p><strong>57% of organizations<\/strong> think it is difficult to adequately protect data in multi-cloud environments while complying with corporate policies and regulations. Different environments have different built-in control tools, which makes it difficult to have a consistent and uniform type of protection. However, <strong>it&#8217;s important to never leave your cloud accounts exposed and without security controls<\/strong>. Remembering passwords can be challenging, which is why many users use simple, common, or reused passwords. While this approach makes it easy for workers to break into their accounts, it becomes an easy target for hackers, particularly if breaching an email address or other business application that is part of the Cloud suite gives intruders the opportunity to escalate their privileges and gain additional control over systems. It is therefore essential that <strong>all Cloud accounts are properly protected<\/strong>, using a strong and unique <strong>password<\/strong> , and that they are also equipped with <strong>multi-factor authentication<\/strong>, so even if the password is cracked or guessed, there is an additional barrier that helps <strong>prevent the attack<\/strong>.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_516\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2022\/06\/two-step-verification-2-2.gif\" alt=\"\" title=\"two-step-verification-2\" class=\"wp-image-35247\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1921  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>2. Don&#8217;t give all users the keys to the &#8220;kingdom&#8221;<\/strong><br \/>Cloud applications and services are cost-effective and provide users with a variety of tools they need to be productive, all in a single environment. But different users have different needs, and most of them don&#8217;t need high-level privileges, particularly when that access could be easily abused by an unauthorized user.<br \/>It is therefore crucial for IT and security teams <strong>to ensure that admin privileges are only available to those who truly need them<\/strong> and that it is properly protected so that attackers are unable to gain access. Be careful, it is also crucial that users <strong>do not have the power to &#8220;increase their privileges&#8221;<\/strong> or create new accounts.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1922  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>3. Make sure cloud applications are always monitored and find out who is using them<\/strong><\/p>\n<p>Businesses use a wide variety of cloud computing services, but the more applications you use, the harder it is to keep track of them. And that could provide a gateway for attackers to enter the network undetected.<br \/>It&#8217;s critical that IT departments have the tools they need to keep track of which cloud services are being used and who has access to them. In addition, <strong>enterprise cloud services should only be available to users who work for the organization<\/strong>. If someone leaves the company, access must be removed. It&#8217;s also important to ensure that <strong>cloud applications aren&#8217;t misconfigured<\/strong>.<br \/>It is critical that organizations are aware of how their cloud services interact with the open web and that only those who need these services can access them.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_467 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2022\/05\/13\/lapproccio-cloud-first-e-la-rivoluzione-nellinfrastruttura-it-e-nelle-competenze\/\" target=\"_blank\">The Cloud-First Approach and the Revolution in IT Infrastructure and Skills<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1923  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>4. Don&#8217;t Ignore Security Updates and Patches: Cloud Software Needs Them Too<\/strong><\/p>\n<p>One of the most important things you can do to improve your network&#8217;s cybersecurity is to apply <strong>security updates and patches as soon as possible<\/strong>. Cybercriminals regularly try to exploit known vulnerabilities in applications to breach networks and lay the groundwork for cyberattacks. Cloud software and applications also need patching, and <strong>it&#8217;s critical that this work is done promptly<\/strong> to ensure that the network is resilient to cybercriminals trying to exploit its vulnerabilities.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_517\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2022\/06\/mvw-korem-2.gif\" alt=\"\" title=\"MVW-KOREM\" class=\"wp-image-35253\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1924  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>5. Don&#8217;t rely solely on the cloud for data storage \u2013 keep backups offline in case of an emergency<\/strong><\/p>\n<p>One of <strong>the main advantages of the Cloud is the ability to store data<\/strong> and be able to access it from any corner of the globe with a simple click. However, this does not mean that the data stored in the Cloud is necessarily accessible 100% of the time. Systems can experience disruptions, and it may be possible for cybercriminals to tamper with data.<br \/>If the identity controls that protect cloud accounts are breached by cybercriminals, data could be deleted or held hostage \u2013 a common tactic used by ransomware gangs, for example, is to <strong>delete backups stored in the cloud<\/strong>. No matter how strong your cybersecurity controls are, protecting cloud accounts is especially important. Data needs to be backed up and stored offline because, if the worst happens and the data in the Cloud is momentarily inaccessible, there is an option to restore from backups.<br \/>Therefore, it is of paramount importance to save backups regularly so that the recovery point is as recent as possible.<\/p>\n<\/div><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>So simple mistakes can open the doors of your company to hackers and get you into trouble.<\/p>\n","protected":false},"author":6,"featured_media":35238,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,2297],"tags":[134,3948,1268,4285,4652],"class_list":["post-36407","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-news-en","tag-cloud-computing-en","tag-cloud-data-security","tag-cloud-security-en","tag-cybersecurity-en","tag-ransomware-en"],"aioseo_notices":[],"jetpack_featured_media_url":"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2022\/06\/45886907warning-yellow-blinking-sign-animated-gif-3-1.gif","amp_enabled":true,"_links":{"self":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/comments?post=36407"}],"version-history":[{"count":1,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36407\/revisions"}],"predecessor-version":[{"id":41723,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36407\/revisions\/41723"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media\/35238"}],"wp:attachment":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media?parent=36407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/categories?post=36407"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/tags?post=36407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}