您现在的位置是:Cloud security: Five things you need to get right >>正文
Cloud security: Five things you need to get right
后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden533人已围观
简介Image: GettyThe popularity of cloud applications and software has risen significantly in recent year...
The popularity of cloud applications and software has risen significantly in recent years. But while using cloud services can be beneficial for businesses and employees, it also carries new cybersecurity risks.
Special Feature
Securing the Cloud
Cloud computing is now a business essential, but keeping your data and applications secure is vital. Find out more about cloud security in this ZDNet special report.
Read nowThe ability to log in from anywhere using cloud applications is convenient for employees, but it's also a potential new opportunity for cyber criminals, who, with a set of stolen passwords, could gain access to sensitive information. There's even the prospect of hackers abusing cloud services to launch ransomware attacks and other malware campaigns.
2. Don't give every user the keys to the kingdom
Cloud applications and services are convenient, providing users with a variety of tools they need to be productive, all in one place. But different users have different needs and most users don't need high-level privileges – particularly when that access could easily be abused by an unauthorized user who has hacked or otherwise taken control of an account with admin rights.
Security
- 8 habits of highly secure remote workers
- How to find and remove spyware from your phone
- The best VPN services: How do the top 5 compare?
- How to find out if you are involved in a data breach -- and what to do next
It is, therefore, imperative for IT and information security teams to ensure that administrator privileges are only available for those who really need them – and that any account with administrator privileges is properly secured, so attackers are unable to gain access and abuse high-level accounts -- to create additional accounts they could use to secretly go about their business, for example. It's also important that regular users don't have the power to escalate their own privileges or create new accounts.
In the worst-case scenario, a misconfigured cloud application facing the open internet may not require login details at all, meaning anyone can gain access. It's vital that organisations are aware of how their cloud services interact with the open web and that only those who need these services can access them.
4. Don't ignore security updates and patches – cloud software needs them, too
One of the most important things you can do to improve the cybersecurity of your network is to apply security updates and patches as soon as possible. Cyber criminals regularly look to exploit known vulnerabilities in applications to breach networks and lay the foundation for cyberattacks.
Cloud
- What is digital transformation? Everything you need to know
- The best cloud providers compared: AWS, Azure, Google Cloud, and more
- The top 6 cheap web hosting services: Find an affordable option
- What is cloud computing? Here's everything you need to know
Cloud software is no different. Vulnerabilities can be uncovered and they will receive security patches, which need to be applied.
IT departments that run large, cloud-based networks might think that security is taken care of by the cloud service or application provider they use, but that's not always the case – cloud software and applications need patching too, and it's vital that this work is done promptly to ensure the network is resistant to cyber criminals trying to exploit vulnerabilities.
5. Don't rely purely on cloud for storing data – keep offline backups in case of emergency
One of the key benefits of cloud software is that, in many cases, it's available at the touch of a button – users can access data stored in the cloud, from wherever they are and from whatever device they're using.
Show CommentsTags:
转载:欢迎各位朋友分享到网络,但转载请说明文章出处“后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden”。http://dzbz.com.cn/news/1123.html
相关文章
How does ChatGPT actually work?
Cloud security: Five things you need to get rightJune Wan/ZDNETGoogle, Wolfram Alpha, and ChatGPT all interact with users via a single-line text entr...
阅读更多
China and US part of multilateral pact to collaborate on AI risks
Cloud security: Five things you need to get rightcofotoisme/Getty ImagesA group of 28 nations, including China and the US, has agreed to work togethe...
阅读更多
Microsoft Build 2022 developer conference: Coming May 24 to a screen near you
Cloud security: Five things you need to get rightCredit: MicrosoftMicrosoft has announced the dates for its annual Build developer conference: May 24...
阅读更多
热门文章
- Hey, Starbucks, how much should I tip for 10 seconds of service?
- Google's new tools help users verify the authenticity of images online faster
- Walls between technology pros and customers are coming down at mainstream companies
- 5 new creator tools YouTube just unveiled, including an AI video generator
- Microsoft and customer FedEx partner on 'logistics as a service'
- AI poised to seriously ramp up DevOps and other forms of collaboration
最新文章
64% of workers have passed off generative AI work as their own
Microsoft rebrands its compliance and data
AI is great at coding, but there are some massive caveats
What is artificial general intelligence really about? Conquering the last leg of the AI arms race
AWS and Salesforce team up to help content distributors deliver better streaming services
I tested Meta's Tom Brady and Kendall Jenner AI chatbots and it was weird