<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Share the Infinigate UK Blog on LinkedIn Share the Infinigate UK Blog on Twitter Share the Infinigate UK Blog on Facebook Share the Infinigate UK Blog on Google+ Share the Infinigate UK Blog via Email

The Top 5 Cloud Security Challenges Haunting Every IT Manager

Topics: Hacking, IT Security, Cloud Security, Managed Security Services, Data Security, MSSP

Posted: 15 May 2019

Top 5 Cloud Security Challenges Haunting Every IT Manager

In today's IT environments, you would be hard pushed to not find some element of cloud usage. Whether that be email, storage or virtual machine hosting and computational power, this is no more evident than the 2018 growth statistics for Microsoft's Office 365; sitting at between 2 and 3 million new accounts added each month.

This relentless path to more cloud adoptions has many benefits, ranging from better cost models, lower in-house costs and less maintenance of physical equipment. The ability to share resources among multiple cloud customers is also undoubtedly good for the environment too.

But, it is not all cloud nine.

There are some serious security challenges to overcome in the cloud, here are our top 5...


1. Data Residency

It's probably not the first threat which comes to mind but given the changes in information security law in several different regions, over the past 2-3 years, data residency is now a question which is at the top of any cloud customers agenda.

Often, the question is: where is my data going to be processed/stored?

This most likely is in relation to the GDPR (General Data Protection Regulation), due to its strict requirements on ensuring that personal data remains in parts of the world where there is sufficient protection.

[Have you checked out "Making your MSP Offering GDPR Friendly - 4 Things to Consider"?]

There are some other things to consider too however. Such as, whether any cloud technical support engineers might have access to data stored in their platform and where they are located?


How backups are managed, stored and transported to long-term hosting solutions?


2. Lack of Control During Downtime

The worst case scenario for any IT manager with significantly importantly services in the cloud is having any downtime or an outage.

It is in these instances that there is a distinct feeling of a lack of control, in comparison to solutions hosted in-house. You will likely not know what the problem is, how long it will take to resolve and whether there has been some loss of data, as a result.

Most cloud providers have up-time promises which allow for some margin of error; often a couple of hours per year. Even the biggest of the cloud providers such as Microsoft have had instances of downtime as recently as this year.

[You might also be curious to read "4 Reasons why the Future is Cloud"]

The most important thing to be aware of is that these occasions are inevitable; and as a result it would be wise to have some kind of plan.


3. System Vulnerabilities

We all scan our in-house systems for vulnerabilities regularly, right?

Well, if you don't, you should, and you should also be asking your cloud hosting and service providers if they do too. Known system vulnerabilities are chinks in armour which are waiting to be exploited, and with cloud providers being a larger target to those wishing to exploit than your in-house network, you can bet that someone is testing those defenses regularly.

The good news is that many cloud providers have accreditation's which require some form of regular vulnerability scanning, whether that be SOC2, PCI-DSS or Cyber Essentials.

Yet nevertheless, ensure you ask your cloud hosting and service provider about their vulnerability scanning and patching programmes.


4. Cloud Service Hijacking

A data or network breach is one thing, but what about instances where an entire service can be hijacked?

There are countless examples today of this type of attack taking place, particularly in relation to cloud-based email and phishing attacks.

Today, the success of a phishing attack is largely determined by how genuine it can appear to be; and hackers know this. Being able to hijack an entire cloud-based email instance allows hackers not only access to email but also the capability to impersonate someone else by using their genuine email account.

It has become relatively common for an email service to be compromised by someone attempting to authorise large payments from the hijacked company/organisation into foreign bank accounts, from an email account with authority, such as a Head of Finance.


5. Larger Attack Target

With tens, hundreds and maybe even thousands of companies and organisations using a cloud-based service, the target of attack changes from the company or organisations in-house network, to that of a cloud host or service provider.

As a result, your data or service is at greater risk from both an outage or theft.

Cloud hosts and service providers tend to have stronger security than in-house networks; and better resiliency due to their combined spending power. However, it would be foolish to assume they are immune to becoming victim.

Make sure you question your cloud host or service provider on how they will lower the risks of using their solutions to an acceptable level.

[You might also be interested to read "Cloud Hosted Software is more secure than your Data Centre (4 Reasons Why)"]

8 Ways to Cloud Managed Security Services

Infinigate UK
Posted by: Infinigate UK
Share via:

Subscribe to VSEC Blog Updates

Terms and Conditions:
  • When completing this form, you are indicating your consent for this processing activity. By doing this you are providing Infinigate UK with lawful consent to process your submitted personal data for one or both of the marketing purposes below:
    • We will use your details to send you blog updates.
    • We will match your answers to areas of interest which believe you have and may send you additional marketing materials related to those areas.
  • We will keep your personal data for nine months, upon which we will delete your personal data unless you have consented to further processing or we have legitimate interests to retain it. You are free to withdraw your consent at any time by contacting our marketing department or using one of our unsubscribe links in our communications.
  • In some cases where you indicate consent for supplying you with additional promotional marketing material, we will share your personal data with one of our reseller partners, should your areas of interest match a solution or service they provide. We instruct all our reseller partners to communicate this data transfer with data subject affected.
  • Your personal data is stored in a marketing automation solution database, access to this is limited to authorised users and all necessary steps to ensure data security is maintained.

For further information about this form, your rights under the General Data Protection Regulation or how to exercise them, please contact Infinigate's marketing department here.

Popular Posts