• In our days the evolution of technology is a constant, however, with it the risks to which cloud users are exposed also grow.

  • Companies cannot be oblivious to the advantages of the cloud in their operation and therefore it is important that they do not stop their migration towards these solutions.

The evolution of technology is achieved every second, however, with it the risks to which cloud users are exposed also grow. Cloud means servers accessed via the Internet, software, and documents running from those servers. For example, although it is now more accessible to have all the information that was previously only stored on the computer, it does not mean that it is 100 percent secure.

The adoption of cloud solutions has advanced rapidly in the last two years as more organizations migrated their operations to the digital world driven by the pandemic. Global spending on these services is expected to reach $482 billion in 2022, which means an increase of 54 percent compared to 2020, according to estimates by the American consulting firm Gartner.

Companies accelerate their career to migrate to the cloud as they advance in the digitalization of their operations, they realize that they require the backup of a large amount of information, while many remote tasks demand these capabilities in the cloud, explains Marco Antonio García Piña, a specialist at A3Sec, a multinational company specializing in cybersecurity.

But the rapid advancement of technology also carries risks, as we see an increase in cybercriminals who already make the cloud a prone target for attack and also allow them to profit.

Regarding the problem, the report "2022 Cloud Security Report" carried out by Cybersecurity Insiders for Fortinet, security professionals highlight the lack of visibility (49%), the high cost (43%), the lack of control (42%) and lack of security (22%) as the top unforeseen factors slowing or stopping cloud adoption.

Additionally, the document indicates that the major security threats in the cloud are led by 62% incorrect configuration in the cloud, followed by 52%, insecure API interfaces, and information exfiltration followed by 51% and 50% unauthorized access to the platform.

Marco Antonio García indicates that, despite the challenges in cybersecurity and the strategies of computer attackers, companies cannot be oblivious to the advantages of the cloud in their operations, and therefore it is important that they do not stop their migration towards these solutions.

A3Sec IT security experts advise that cloud cybersecurity policies be a shared responsibility. This means that the service provider must guarantee the correct operation of the infrastructure and the network so that leaks are not generated in the different processes.

Meanwhile, customers must ensure the correct operation and configuration of the systems so that they remain secure. The posture of the clients of these services towards cybersecurity is key to avoiding leaks of information that, by adopting the correct measures, would be avoidable.

Auditing on an ongoing basis can help drive cloud cybersecurity policies and ensure that standards are being met.

  • In turn, companies are recommended to prevent problems by adopting actions that may be decisive in the event of an attack, such as cybersecurity controls that are essential.
  • Monitoring. Know what is happening (detection and response).  Automation. Respond faster than the cyber attacker.
  • Have an attack recovery plan, as well as data encryption and backup.
  • Training and continuous training. While embracing automation so that system configurations are always correct, minimizing human errors that can lead to costly responses and hard-to-remedial hits to reputation.

El impulso de la nube surgió desde hace 10 años, con el objetivo de  tercerizar el costo de la infraestructura y que las empresas se enfoquen en su negocio principal sin preocuparse por todas las cosas que se deben de soportar.

 

>_

Otros Blogs

Isotipo A3Sec