3 Cloud Security Tactics Your Business Must Have for 2020
June 10, 2020 By Christopher George cybersecurity, data security, IT, it security
Three factors played a major role in more than 60% of data breaches last year, according to the 2020 Verizon Data Breach Investigations Report. Companies across the globe are still falling behind when it comes to preventing these go-to attacks: credential theft, business-email compromise, including phishing, along with human errors.
The report also highlights how security tactics for these three factors should be where most organizations are placing the majority of their focus, not only in cloud infrastructures, but for on-premises environments as well. Let’s take a closer look at how continuous monitoring within a multi-layered security solution can proactively give you a competitive advantage, particularly in the cloud.
1. HUMAN ERRORS
Verizon’s Data Breach Investigations report found misconfigurations that leave cloud-server buckets without password protection, along with poor asset management and employee errors are on the rise, with a 4.9% increase over last year. While relying on certified-cloud expertise to build and deploy your cloud environment is perhaps the most critical first step to protecting data, continuous monitoring and vulnerability management will work to keep you safe from a technical standpoint. Our Premonition™ Security Suite offers Security Information and Event Management (SIEM) technology that constantly monitors, detects, correlates and quickly responds to threat activity across your entire IT infrastructure. This includes pinpointing misconfigurations and other vulnerabilities caused by human error.
2. PHISHING AND EMAIL COMPROMISE
Perhaps the most frustrating vulnerability that continues to be a thorn in the side of companies globally is social engineering attacks, such as phishing and email compromise. The report strongly suggests the IT industry as a whole must become more adept at taking the human factor out of the exploit, not only with better employee awareness and training, but also from at technology position.
Protelligent® can help level the playing field in both of those areas. Our online organizational awareness courses through our managed-security platform are instructor led and provide comprehensive training that covers a range of security topics relevant to the most current threats. In addition, we also partner with you to perform routine penetration and attack resiliency testing using the latest social-engineering tactics to find the human vulnerabilities within your organization. Our Security Operations Center (SOC) delivers another layer of protection by leveraging the latest threat intelligence to continuously monitor account activity. This enables malware and other social-engineering vulnerabilities to be proactively identified and remediated.
3. CREDENTIAL THEFT
Verizon points to the key finding that brute-forcing of passwords, as well as the use of lost or stolen credentials were a factor in roughly four out of five breaches caused by actual hacking. In addition, used or stolen credentials were responsible in part for 37% of all breaches. The report also notes until businesses implement multi-factor authentication across the board, this method of attack will continue to spiral.
Protelligent’s certified AWS-architects can help you through every step of setting up and maintaining these critical administrative controls. From multi-factor authentication implementation and credential monitoring to creating and enforcing resource-access policies, we have the capabilities to deliver end-to-end support, work alongside your existing IT department or provide escalation services.
The bottom line is companies can no longer take shortcuts when it comes to quickly identifying and responding to both external and internal factors that threaten data security. Our Premonition™ Security Suite breaks through the barriers small and medium-sized businesses typically experience in running a multi-layered security platform that includes continuous monitoring, penetration testing and employee training. Call our AWS-certified cloud architects at (855) PRO-TELL and get enterprise-class security now.
Recent Posts
Archives
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- September 2019 (2)
- July 2019 (1)
- June 2019 (3)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- May 2018 (1)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (3)
- September 2017 (2)
- August 2017 (3)
- July 2017 (2)
- June 2017 (5)
- May 2017 (7)
- April 2017 (5)
- March 2017 (5)
- February 2017 (1)
- January 2017 (5)
- December 2016 (1)
- October 2016 (4)
- September 2016 (1)
- August 2016 (3)
- July 2016 (1)
- June 2016 (1)
- May 2016 (1)
- April 2016 (1)
- November 2014 (1)
- July 2014 (2)
- June 2014 (1)
- May 2014 (3)
- April 2014 (3)
- March 2014 (1)
- February 2014 (2)
- January 2014 (3)
- December 2013 (1)
- November 2013 (4)
Categories
- Community (19)
- Cloud (18)
- IT (16)
- cloud backup (16)
- cybersecurity (15)
- cloud backup data recovery (9)
- cloud computing (8)
- clouddr (8)
- it security (8)
- cloud storage (7)
- data security (7)
- AWS (6)
- Education (6)
- cloud services (6)
- Giving Back (3)
- cloud restoration (3)
- compliance (3)
- data (3)
- assessment (2)
- business (2)
- chief information officer (2)
- client satisfaction (2)
- cloud data recover (2)
- cloud dr (2)
- critical power exchange (2)
- cyber (2)
- cyber responsibility (2)
- data recover (2)
- datacenter (2)
- duo security (2)
- end-to-end encryption (2)
- hackers (2)
- holiday season (2)
- internet (2)
- storage (2)
- 2019 goals (1)
- Android (1)
- Arts (1)
- Business Continuity (1)
- CASBO (1)
- Cisco Cloud Web Security (1)
- Cisco Security Intelligence Operations (1)
- Custom Design (1)
- Graphics (1)
- Protelligent (1)
- Virus (1)
- account protection (1)
- advanced persistent threats (1)
- alien vault technology (1)
- alienvault technology (1)
- antivirus program (1)
- antivirus software (1)
- apis (1)
- apt (1)
- attachment (1)
- attack (1)
- automatic updates (1)
- awareness (1)
- backup (1)
- benefits (1)
- best practices (1)
- bot-driven attacks (1)
- bring your own device (1)
- bug (1)
- business growth (1)
- byod (1)
- california joint powers insurance authority (1)
- california jpia (1)
- check cashing (1)
- cisco (1)
- cjpia (1)
- client testimonial (1)
- cloud backup vs cloud storage (1)
- cloud computing services (1)
- cloud conversion (1)
- cloud migration (1)
- cloud recovery (1)
- community link consulting (1)
- compliance program (1)
- compliance regulations (1)
- computer science (1)
- computer security (1)
- computers (1)
- contain attacks (1)
- cost of cybercrime (1)
- cost of data breach study (1)
- critical power (1)
- critical power products & services (1)
- customer testimonial (1)
- customer testimonial video (1)
- cyber liability (1)
- cyber-threat (1)
- cybercrimes (1)
- cybercriminals (1)
- cybersecurity program (1)
- data access (1)
- data breach (1)
- data breach protection (1)
- data center (1)
- data encryption (1)