Top 7 security mistakes when migrating to cloud-based applications

 With the pandemic, many companies have moved to more cloud-based applications out of necessity, because more of us are working remotely. In a Menlo Security survey of 200 IT managers, 40% of respondents said they are facing growing threats from cloud applications and Internet of Things (IoT) attacks because of this trend.


There are good and bad ways to do this migration to the cloud. Many of the pitfalls are not exactly new. At a Gartner meeting in 2019, for example, two IT managers said their Office 365 deployments were halted due to the need to update legacy equipment. The way we now use - and share - our home computers has changed. Our PCs are no longer personal. That same computer can support your child's virtual school and your spouse's applications as well. A survey conducted in mid-June 2020 by CyberArk found that more than half of the respondents saved their passwords in the browsers of their corporate PCs. This does not bode well for any security policy, for sure.


Here are the top seven mistakes that negatively affect security and some tips on how to avoid them.

The Linux administrator has an active role in patching, compiling, securing, and troubleshooting Linux servers in a heterogeneous environment. The professional performs system updates and server configurations. 

Using VPN for remote access

With all remote workers, a VPN may not be the best answer for remote access. See what happened in December 2020 with the FireEye hack. A compromised VPN account was apparently the hacker's entry point to steal his tools. In the past, VPNs were the best way to protect remote employees. It is much better to replace VPNs with zero trust networks, where identity is the control plan and provides the context for access. In addition, you should make sure to have home-based infosec policies that have been written since the beginning of the pandemic that take these situations (such as the multi-user home PC) into account.

Know more: Managed Storage Services

Comments

Popular posts from this blog

Women and servers with young children

WAN port: for advanced and different from LAN