您现在的位置是:Cloud security: Five things you need to get right >>正文
Cloud security: Five things you need to get right
后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden69434人已围观
简介Image: GettyThe popularity of cloud applications and software has risen significantly in recent year...
The popularity of cloud applications and software has risen significantly in recent years. But while using cloud services can be beneficial for businesses and employees, it also carries new cybersecurity risks.
Special Feature
Securing the Cloud
Cloud computing is now a business essential, but keeping your data and applications secure is vital. Find out more about cloud security in this ZDNet special report.
Read nowThe ability to log in from anywhere using cloud applications is convenient for employees, but it's also a potential new opportunity for cyber criminals, who, with a set of stolen passwords, could gain access to sensitive information. There's even the prospect of hackers abusing cloud services to launch ransomware attacks and other malware campaigns.
2. Don't give every user the keys to the kingdom
Cloud applications and services are convenient, providing users with a variety of tools they need to be productive, all in one place. But different users have different needs and most users don't need high-level privileges – particularly when that access could easily be abused by an unauthorized user who has hacked or otherwise taken control of an account with admin rights.
Security
- 8 habits of highly secure remote workers
- How to find and remove spyware from your phone
- The best VPN services: How do the top 5 compare?
- How to find out if you are involved in a data breach -- and what to do next
It is, therefore, imperative for IT and information security teams to ensure that administrator privileges are only available for those who really need them – and that any account with administrator privileges is properly secured, so attackers are unable to gain access and abuse high-level accounts -- to create additional accounts they could use to secretly go about their business, for example. It's also important that regular users don't have the power to escalate their own privileges or create new accounts.
In the worst-case scenario, a misconfigured cloud application facing the open internet may not require login details at all, meaning anyone can gain access. It's vital that organisations are aware of how their cloud services interact with the open web and that only those who need these services can access them.
4. Don't ignore security updates and patches – cloud software needs them, too
One of the most important things you can do to improve the cybersecurity of your network is to apply security updates and patches as soon as possible. Cyber criminals regularly look to exploit known vulnerabilities in applications to breach networks and lay the foundation for cyberattacks.
Cloud
- What is digital transformation? Everything you need to know
- The best cloud providers compared: AWS, Azure, Google Cloud, and more
- The top 6 cheap web hosting services: Find an affordable option
- What is cloud computing? Here's everything you need to know
Cloud software is no different. Vulnerabilities can be uncovered and they will receive security patches, which need to be applied.
IT departments that run large, cloud-based networks might think that security is taken care of by the cloud service or application provider they use, but that's not always the case – cloud software and applications need patching too, and it's vital that this work is done promptly to ensure the network is resistant to cyber criminals trying to exploit vulnerabilities.
5. Don't rely purely on cloud for storing data – keep offline backups in case of emergency
One of the key benefits of cloud software is that, in many cases, it's available at the touch of a button – users can access data stored in the cloud, from wherever they are and from whatever device they're using.
Show CommentsTags:
转载:欢迎各位朋友分享到网络,但转载请说明文章出处“后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden”。http://www.dzbz.com.cn/news/3972.html
相关文章
ChatGPT subscribers can soon build their own custom chatbots
Cloud security: Five things you need to get rightOpenAIImagine creating your own ChatGPT chatbot that can handle virtually any task you want. Well, t...
阅读更多
Uh oh, now AI is better than you at prompt engineering
Cloud security: Five things you need to get rightJohanna Parkin/Getty ImagesYou've just figured out your next career move: becoming a wiz at prompt e...
阅读更多
Internxt Send is a ridiculously simple tool for sharing large files with others
Cloud security: Five things you need to get rightGetty Images/iStockphotoSending files is easy. Create a new email, attach a file, and send. Done. Si...
阅读更多
热门文章
- Low and no
- Microsoft's Copilot AI app expands to iPhone, iPad
- The year of tech unicorns: India's startup ecosystem sees record
- I spent a weekend with Amazon's free AI courses, and highly recommend you do too
- BYO Google account: Google unveils a free version of Workspace for users at work
- How to use Opera's built
最新文章
ChatGPT is no longer as clueless about recent events
How to use Norton's free AI
OK, we're going full digital: Anyone out there to help us?
How to customize the folders synced in your Google Drive desktop app
Adobe's new generative AI tool is a game
These are technology leaders' biggest worries about using AI at work