eBooks/eGuides

repelling cyberthreats

Issue link: https://insights.oneneck.com/i/1093576

Contents of this Issue

Navigation

Page 8 of 10

How to Address Essen al Security Considera ons Even as cloud providers promise greater security than localized infrastructures, companies deploying cloud solu ons are s ll ul mately responsible for their own data and opera ons. Here are five important steps organiza ons can take to address security considera ons in a mul -cloud environment: Follow public cloud best prac ces - Public cloud providers like Azure, Google and AWS all outline their own best prac ces for u lizing their pla orms and services, which include security. Addi onally, iden fying which applica ons can successfully move to the public cloud (i.e., which are "backward compa ble") and whether a hybrid cloud environment makes sense helps companies stay abreast of cybersecurity concerns across the spectrum of their workloads and pla orms. Create a cybersecurity policy based on industry framework - Developing a comprehensive cybersecurity policy framework can help accelerate a company's response to a acks and work to keep them from happening in the first place. A high-level map of cybersecurity outcomes — assessment, detec on, mi ga on and recovery — acts as a guide to managing those outcomes while also defining regulatory compliance demands and helping companies select the appropriate cloud services to meet security needs. Approach shadow IT with cau on - Using IT tools and solu ons without organiza onal approval can be both a blessing and a curse, depending on individual company culture. But while the use of shadow IT has led to flexible, fast and innova ve approaches to today's business problems, it also poses significant risk. To help assure security and compliance company-wide, execu ve buy-in shouldn't be op onal. 9 oneneck.com 04

Articles in this issue

Links on this page

Archives of this issue

view archives of eBooks/eGuides - repelling cyberthreats