cloud 2104829 1920

Many organisations are using cloud storage to store and manage their ever increasing volumes of data. Cloud storage has many benefits: it’s accessible from anywhere, easy to expand and doesn’t require a physical device which takes up physical space.

But what happens if your cloud storage is suddenly held ransom?

In 2016, Uber famously had a very public breach in security when hackers hacked into their storage accounts, demanding a hefty sum to regain their access. Uber paid the ransom and hoped the breach of data would never surface, but in 2017 they lost the trust and respect of many of their customers.

What can you do to protect your cloud storage?

One of the best pieces of advice we can give you is to stay updated on the types of threats that other companies are facing.

It is predicted that in 2020, that 95% of cloud security failures will be the customer’s fault.

To make sure your cloud storage isn’t left vulnerable to hackers, we’ve put together some steps to help with your cloud data security:

  1. Encrypt your data
    If your company’s data is outside its walls, then it should be encrypted. If the data is encrypted and only certain members of staff hold the keys, then there is nothing to worry about even if your data does become exposed. It will be unreadable to anybody without a key.
  2. Manage access permissions
    Preserve your permissions by using a multi-layer access control system. This system can cover everything from access permissions all the way to the file level for relevant workloads, connecting them to a central directory authentication system.
  3. Invest in data loss prevention (DLP)
    DLP software will monitor data-access patterns that can detect data-leakage, block policy violations and make it possible to stop users sending sensitive data outside of company walls.
  4. Lock down endpoints
    Enterprise EMM/MDM tools will eliminate shadow IT and create productivity spaces that are more secure. Secure productivity spaces are particularly important within corporate provided and BYOD devices.
  5. Run periodic penetration tests (pen)
    Performing regular pen tests will help to evaluate the company’s security posture and will inform you of any new leaks.

Performing these measures together will help protect your company from any data breach within your cloud storage system.

If you would like any advice about your cloud storage system or security information, contact our experts on 0800 9250625.