The saying goes, “if you want something, go get it.” According to RightScale’s 2016 State of Cloud report, 95% of businesses surveyed use cloud services. Clearly, businesses have jumped at the chance to use cloud-based services to improve their business operations.
But with the cloud, security has always been, and still is, the elephant in the room. Several recent reports found that cloud security is still a big worry among enterprises, even with adoption at near all-time highs. What is my response to those who desire more security with their cloud strategy?—well, go get it.
Enterprises likely have one of three mindsets when it comes to cloud security:
- The cloud is awesome! It is probably secure enough.
- I am staying away from the cloud until it is more secure.
- Do I like the cloud? Yes. Do I wake up in a cold sweat every night because of security concerns? Also, yes.
Regardless of where you stand, I bet you can still benefit from the “go get it” philosophy. Are you unsure if it is secure? Secure it. Do you wish it were more secure? Make it more secure. Do not just wait for a magic bullet to “secure” your cloud.
Even if security falls much lower on the spectrum of cloud concerns, it is still a good idea to invest a little time to evaluate your cloud security situation. Even if you do not identify any issues, you will gain peace of mind knowing that you are doing everything you can do. Here are some good places to start.
Obviously, it is necessary to evaluate the connection’s security. Unless you are operating a private cloud network, use a VPN to protect access to your cloud services. The public Internet is a risky place for your sensitive data. There are a number of available services that provide highly-secure connections to the most popular clouds.
You should also assess mobile device security. Know what devices are on your network and what kind of traffic goes through them. Enterprise mobility managers can help you do just that. In addition, they can also help push settings, applications and updates to your staff’s devices. In a worst-case scenario, they can remotely wipe and lock stolen or lost devices.
Encrypt at Rest and In Motion
The funny thing about the cloud is that it means your data is often in motion. As a result, you have to address security as the data rests at either endpoint, as well as while it is in transit. The right encryption solution can help protect the data’s security without burdening employees with workflow barriers.
Managing security around users, devices and cloud services can be overwhelming. A Cloud Access Security Broker (CASB) can help organize security policies at every step. Because it sits between your network and your cloud services, it can provide a valuable layer of security that can work across all clouds.
When all else fails, rapid response to an incident is your best friend. That requires prompt notification that something is amiss. Automated threat management systems can quickly detect and flag irregular data patterns that could point to a breach. In a breach situation, every minute counts to help mitigate the damage potential.
We all know that in data security, nothing is fool-proof. But cloud security is not a mystical element only possible through sorcery. It is attainable. If you need help assessing your needs, visit us at https://www.business.att.com/enterprise/Portfolio/cloud/ for more information.