Cloud Security Is Different

The move toward the Cloud for data and services has many companies rethinking their approach to cyber security. Recent surveys have shed light on how security strategies are changing, and more important, how they should change. 

Placing more IT infrastructure in the Cloud is in some ways more secure than having it in-house. Not least, users can be reasonably confident that the system is running the latest version with the proper patches in place. 

 

Cloud service providers are also building in new capabilities such as using machine language for anomaly detection, however it also presents new risks, some of which is the result of misunderstanding how to manage their security in the Cloud.

For more than a decade, security leaders have predicted that a disastrous event  was in prospect that would dramatically change society as we know it.  Now the Coronavirus pandemic is having a global impact, affecting the environment, industry, finance, healthcare, leisure and almost every other human endeavor. The acceleration of digital transformation, which changes how organisations operate and provide value to their customers is just one example of this. There is also an increased demand for cloud computing, which provides most of the foundations, tools and infrastructure to fuel the digital transformation. 

The Benefits Of Cloud Computing Include:

  • Shifting business models from Capex to Opex: allowing companies to pay only for the IaaS, PaaS and SaaS resources that they use, using service-based payment instead of asset purchase and often resulting in significant cost savings.
  • Scalability: where computing, network and storage capacities can be increased and decreased almost infinitely and almost immediately in response to fluctuations in demand.
  • Agility; where developers can make continuous improvements to applications and these improved applications can be deployed to customers, multiple times per day.
  • High availability: disaster recovery and redundancy is improved by cloud vendors who provide uptime SLAs and multiple geographical availability zones.

The most important benefit is to allow companies to focus on their own business, while leaving the overhead of their non-core business elements, like infrastructure, platforms and software, to cloud vendors.

This acceleration in digital transformation and demand for cloud computing is occurring because of the impact of remote working that prevents businesses from functioning  normally and having to quickly adapt their processes to stay in business.

Indeed, it is quite possible that companies are enjoying some of the benefits of remote work and will encourage more widespread and long-term remote work after the pandemic has ended.

  • E-commerce boom: During the lockdown, online shopping spiked, especially for food and other essential supplies. Online retailers generally use cloud-based solutions that are scalable; business can continue as normal during the demand spikes.
  • Home entertainment: Netflix is reporting twice as many new subscribers as expected in Q2. This is an expected outcome of closed cinemas, theatres and restaurants, although it remains to be seen whether home entertainment will maintain its attraction after the pandemic has passed.
  • Healthcare: The primary concern during the Coronavirus has been medical. Remote access to doctors and medical assistance was often the difference between life and death, and we can expect this remote access trend to continue after the pandemic is behind us, albeit with less urgency. Cloud benefits like scalability and redundancy are vital to support this effectively.

Business continuity during the pandemic has been dependent on cloud computing, as many users have found that having the option to quickly ramp up capacity has been the difference in being able to run their  business and going out of business

While IT spending in 2020 will slow significantly due to the coronavirus pandemic, it is possible that public cloud computing will benefit significantly from the long-term impact of the pandemic due to some of the trends mentioned above.

Cloud Usage Is Growing Alongside The Need For Cloud Security:

  • The growth in cloud computing means that more companies are putting more data and applications online, which attracts threat actors and cyber-criminals, eager to benefit from the potential to make easy money through various cloud cyber security schemes.
  • Boredom may be a factor in the increase of cloud cyber-crime, when vast numbers of people are stuck at home and the Internet is one of their only connections to the outside world.
  • Remote work, increased home entertainment, remote healthcare and a larger "online footprint" cause different patterns of network access and increases the potential attack surface.Home networks are generally less safe than an  office network and its a problem to access business-critical applications and data using a potentially unsecured home network connection.
  • The rapid and unplanned quarantine and remote workforce has resulted in security shortcuts. When faced with the dilemma of "quick and dirty" or "slow and steady", some companies chose the quick route, intending to retrofit stronger security measures after employees started to work remotely. 

Exploiting an unplanned or poorly executed  adaptation to remote working without an integrated security strategy is the first thing that a hacker will be looking out for.  So how can organisations speed-up, while staying safe?

  • Consult a trusted cloud security advisor: In order to benefit from industry best practices and architect cloud security into the design.
  • Prevention is the only option for cloud security:  Cloud security detection exposes organisations to risky and expensive cloud security threats which cause real danger well before the threat can be managed.

A study of cloud security carried out KPMG has report showed that 66 percent of survey respondents believe that traditional security solutions either do not work or have limited functionality in the cloud. 

In a post-pandemic world with accelerated cloud computing, a remote workforce, dynamic network access and more attack vectors for cloud threat actors, good security in the cloud is critical. 

NCSC:      IT News Online:      GovTech:      CSO Online:      Cloud Security Alliance

You Might Also Read: 

The Future Of Ransomware Is In The Cloud:

 

« Quantum Computing Will Have A Revolutionary Effect
Employees Are The Biggest Cyber Security Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Zanasi & Partners

Zanasi & Partners

Zanasi & Partners is a security research and advisory company active in the EU and MENA areas. Services focus on technology solutions.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Centre for the Protection of National Infrastructure (CPNI)

Centre for the Protection of National Infrastructure (CPNI)

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services.

Pragma Strategy

Pragma Strategy

Pragma is a CREST approved global provider of cybersecurity solutions. We help organisations strengthen cyber resilience and safeguard valuable information assets with a pragmatic approach.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

QFunction

QFunction

QFunction works within your existing security stack to detect anomalies and threats within your data.