Norm presents The Forgotten Middle Brochure - Flipbook - Page 10
10
11
Cloud Security Attacks
More organisations than ever are relying on cloud applications and
services, and this is especially prevalent in the midsize market because
so many of these organisations were “born in the Cloud” and have
no legacy infrastructure to hold them back. The benefits of Cloud
computing are well known, and for start ups, scale ups and disruptors
alike the ability to scale and flex as the business grows is vital.
As soon as you start sending assets up into the Cloud it widens the
threat landscape. Typically, organisations rely on the security measures
of the cloud service provider, but these are usually very basic and will not
protect you against the majority of modern cyber threats. A simple firewall
or signature-based anti-virus program doesn’t stand a chance against
a zero day exploit, for example.
The flipside of this phenomenon is that the more an organisation relies
on the cloud the more the risk grows. Not because cloud applications
are inherently unsafe, rather that traditional IT security is geared around
securing the local network and infrastructure.
Compound this with the fact that as Cloud services become more
popular with businesses so they become more attractive targets for
hackers, and you have the perfect recipe for major operational disruption.
It is imperative that your company implements a holistic cyber security
strategy which includes measures to protect its Cloud-based assets.