Secure your business

Seven steps to securing the cloud

Smarter Staff
Smarter Writer

This article has been written by the Smarter Business™ Staff Writers

Smarter Staff
Smarter Writer

This article has been written by the Smarter Business™ Staff Writers

Cloud security is about more than strong passwords and keeping hackers out – it’s about knowing who has access in the first place.

Seven steps to securing the cloud

Audit everything

You can’t control what you don’t know. The first step to securing your technology infrastructure is to know what is being used within your organisation through audits and regular assessments. Using a Cloud Application Security Brokering (CASB) solution will help you identify the applications in use, as well as the potential risks.

Bring the board along

Whereas data security was once confined solely to the IT department, it is now an all-of-business challenge. Bringing senior executives and C-suite leaders into the conversation is crucial in building a secure system. This means consulting regularly across teams, and communicating issues to board members clearly, in terms they understand.

Educate all staff

Basic security begins on the frontline, and educating employees about vulnerabilities and prevalent types of attacks is vital. To ensure sensitive data is not lost, destroyed or held to ransom, the onus is on organisations to provide regular training and knowledge assessments to staff, and to uphold bring-your-own-device (BYOD) policies.

Make an action plan

An established security action plan will help you prevent sensitive data being leaked or misused. Designed to mitigate cloud risks, an action plan should also include detailed disaster recovery responses and plans to handle outages with your cloud provider.

Between October 2014 and March 2015 alone there was a 49 per cent increase in the number of new mobile malware instances globally.

Watch the shadows

As employees aren’t always willing to wait for approved IT solutions, knowledge gaps or “shadows” in the understanding of cloud app usage often occur. This can result in hidden costs stemming from compromised data and attacks, such as malware or phishing. According to Telstra’s Cyber Security Report, between October 2014 and March 2015 alone there was a 49 per cent increase in the number of new mobile malware instances globally.

Don’t forget passwords

Secure passwords are paramount for secure technology. Where possible, use two-factor authentication rather than just username and password access for IT infrastructure and web applications. Also make sure to activate password lockout after a fixed number of failed login attempts.

Measure for success

Metrics are paramount for measuring success and tracking organisational performance in line with goals, tactics and outcomes. Regularly scheduled penetration and vulnerability scan testing will also help ensure the appropriate tools are in place, allowing you to readjust targets and plans to remain secure.

Cyber security has become a business risk, not just an IT risk. To find out more, download the Telstra Cyber Security Report.

Speak to a Telstra Security Specialist, we can discuss your high-level security posture and help you manage the risk.

Related News

Image depicts online shopper holding credit card on laptop
Secure your business
Secure your business
Five cyber security trends to watch in 2017

Leaders know their businesses can’t leave cyber security strategy to the last minute – because without it, the next attack might wipe out the company’s future.

colleagues sitting on table in modern space
Liberate your workforce
Liberate your workforce
Decades ahead: Workplace 2025

Welcome to Workplace 2025. It’s an office – just not as you know it.

Towards a smarter 2030
Optimise your IT
Optimise your IT
Towards a smarter 2030

Smart technology has revolutionised how we do business. Now it just might help us save the planet.

From man to machine: Life in the sci-fi era
Create transformative innovation
Create transformative innovation
From man to machine: Life in the sci-fi era

We’ve finally reached the era sci-fi writers and filmmakers have long dreamed of as the modern world explores the possibilities of artificial intelligence and robots.