Our blog

The cloud: cyber risk and business rewards


28 November 2016

Global Services

Blogs by author: Global Services, We’re a leading global business communications provider


Organisations taking advantage of the cloud risk their data. So it’s critical they deploy prevention-focused security architecture, as our whitepaper explains.

The benefits of moving to the cloud.

If it puts the security of your data at such risk from cyber criminals, why would organisations choose to move to the cloud? Well, the benefits of the cloud are so good that they make the increased risk worthwhile.

Some of the positives include extra organisational agility, more opportunity to innovated and lower costs — through reduced capital and operating expenses. It’s also the best way to take advantage of virtualisation, which is why so many organisations have already migrated to the cloud.

The risks of moving to the cloud.

The broader distribution of data and applications in the cloud increases the risks — because there are more ‘ins’ for cybercriminals to exploit. And the goal of our whitepaper, ‘Securely enabling cloud adoption’, is to guide organisations through the security considerations this raises.

Organisations must concentrate on a prevention-focused security architecture for cloud deployment — designed to stop threats across all potential attack vectors. To help, our whitepaper outlines all the key questions to ask, and rules to follow, when establishing your cloud strategy. And it will help organisations take advantage of the cloud, while remaining confident that they’re not leaving themselves exposed to new cyber security risks.

The three fundamental questions.

The key questions to consider when adopting cloud services, include:

 1. Who’s really responsible for our data?

You. In public cloud environments, as the data owner, you’re responsible for your data — not the cloud service provider (CSP). And although the CSP will secure the underlying infrastructure, the safety of your applications and data is your responsibility. So you need a consistent security posture.

 2. Who has access to our applications and data?

A role-based access policy can help mitigate the risk of data loss. Although the CSP will have authorisation messages in place, it’s important you decide who should have access and whether additional assurance is required.

 3. What happens if there’s a security breach?

What kind of support will the CSP give if there’s a breach? It’s important to know this before launching a cloud strategy.

Greg Day, VP and CISO EMEA, Palo Alto Networks, says: “Armed with answers to these questions, executives will be well placed to exercise their risk management duties to their organisations.”

There’s plenty more information in our whitepaper to guide you through these. Download it here.