fbpx
316200ef-mec-menu-logo-blue

Forcepoint: Addressing the Top 3 Risks of Your Transition to the Cloud

Addressing the risks of transition to the cloud with Forcepoint

As of late, we heard the updates on delicate data getting uncovered from web-based filesharing accounts. It was not amazing and I’m certain most of my partners in cybersecurity were not astounded by it either. In any case, not every person is considering cloud security while concentrating on carrying out their responsibility. With an end goal to share what I have gained from exchanges with security architects and industry pioneers, here are the best three dangers that most associations face when they move to a cloud situation.

1. Users oversharing data in file-sharing apps

Normally, workers are good-natured when they share data in file sharing applications. They are not endeavoring to put the association in danger, rather they are attempting to be beneficial and aggressive. Be that as it may while doing that security isn’t at the forefront of their thoughts. That is the reason we have seen an expansion of cloud application utilization in a group by group premise. The HR, advertising, deals, fund, and others are on the whole utilizing diverse applications which suit their need the most however at what cost. Frequently, the workers end up sharing a lot of which can be an immense hazard to the associations. This could likewise incorporate sharing touchy data outside the associations by means of freely sharing connections.

2. Admins making mistakes or coming under attack

Before, high esteem resources were verified on-premises while under consistent observation. We would realize who got to these advantages in all respects effectively if something somehow happened to get traded off. With the change to the cloud, examination around who is getting to sensitive and secret resources from where winds up basic for data security. Cloud managers hold the notorious ‘keys to the kingdom’ which makes them high esteem targets. As managers are people there will undoubtedly be intermittent oversights that they make which could be expensive to the association. This is notwithstanding administrators getting focused on or assaulted which happens frequently because of the esteem their entrance speaks to.

3. Employees or partners accessing cloud apps using their personal devices

Gone are the days when individuals would just react to email or access business applications amid set hours inside multi day or working from a particular area. Workers and accomplices alike are on an every minute of every day check to be aggressive in this day and age. This implies an ever increasing number of clients are getting to cloud administrations from their own devices (BYOD). The greater part of the occasions these devices don’t have any specialist running on them as they are not corporate issued. At the point when clients get to cloud applications and administrations utilizing these devices, this collaboration is totally imperceptible to conventional IT frameworks. This will in general be a huge vulnerable side and a developing test for some, associations grasping the cloud.

Addressing the risks of transition to the cloud

Knowing the dangers above, will you or your association hinder the selection of cloud innovation later on? I don’t think so (and I want to think not) however what would we be able to accomplish for circumstances like these or ones which have not become known yet. We need to change the manner in which we consider cloud security past the cloud specialist co-op. Here are the three things most significant while verifying cloud applications:

Visibility

We need to understand what apps are in use and who is accessing them from where. Many organizations have no idea what all cloud apps are being used in their environments or if they do might not know who all are accessing them. This brings me to the adage – you cannot secure what you cannot see.

Risk Assessment

Once we know the details of who is accessing the cloud apps and data we need to assess the risk associated with activities that users are performing. This is where behavioral analytics comes in to play.

Protection and Policy Enforcement

Once we know the risk in our environment we can stop data exfiltration or access with automated policies or can leverage our SOC to handle the highest risk users/events first. Having all the activities is important to give context for enforcement and also makes the analytics better.

 

To have the capabilities above you can leverage tools like Cloud Access Security Broker (CASB) as they secure any app which might be in use in your environment. As an example, you can set a policy for all apps, that anyone from outside the organization is blocked or removing all sharing links from sensitive data uploaded. In the case of a recent breach where sensitive data was accidentally shared publicly, the malicious users would have been stopped in their tracks from accessing it, as they are coming from outside the organization. The beauty of this is, now you do not have to go to individual apps (like Office 365, Box, Dropbox, Salesforce, and others) to make sure things are all set correctly.

Download Free Forcepoint Resource

 

Get access to authentic content from one of the leading cyber security experts in the world from the Philippines’ premiere technology provider.

Ready to Get Started?

Ready to
Get Started?

Connecting with MEC provides you with access to globally recognized technology brands and a range of premium value-added services.