Cloud Security New Year’s Resolutions to Keep Let’s dust off the old notepad and put on our optimist hats. That’s right, it’s time for new year’s resolutions. Shed Excess…

Cloud Security New Year’s Resolutions to Keep

Michael Gleason

I spend my days (and nights) explaining how the strengths of the cloud - high availability, scalability, and interoperability - can help us overcome what is often considered its greatest weakness: security.

Share

Let’s dust off the old notepad and put on our optimist hats. That’s right, it’s time for new year’s resolutions.

CloudLock-Cloud-Security-Resolutions

©iStockphoto.com/JulyVelchev

Shed Excess Weight

As we regain consciousness following our holiday dinner-induced food comas, gym membership registrations skyrocket. And while we’re on the topic of shedding excess, why not take the same approach to security operations?

How many different screens do your security ops staff need to navigate every day? If it’s a one-to-one relationship with the amount of cloud platforms in your organization (for example, one for Google Apps, one for Salesforce, one for Dropbox, etc.), it would be safe to say there is an impact on the efficiency and effectiveness of your security program. Ditching a patchwork of niche, single-platform security tools in favor of a unified security fabric helps improve both.

If It’s Worth Doing, It’s Worth Doing Right

Of all the overused idioms, this one always stuck with me. On the security front, that means bridging the gap between “check-box” security and compliance initiatives and a true, comprehensive information security program.

With the endless torrent of headline-worthy breaches coupled with the concern of audit failure, this means security professionals must understand their infrastructure to a greater extent than cybercriminals and auditors – and then take the necessary steps to achieve a superior level of security.

Be Kind to Others

There’s much to be gained by exercising compassion for others when determining a course of action. In security speak, this translates to understanding the impact your security program has on end-users.

We see programs that run the gamut from cumbersome and disruptive blocking strategies to measures that empower users to accomplish their business objectives as efficiently as possible. But which is more secure? Let’s consider the following: who is more likely to hop on their phone’s wireless hotspot to inject sensitive corporate data into unsanctioned and unmonitored platforms. Businesses with people-centric security programs enjoy  both increased productivity and security. Let’s be kind in 2015.

Think Before Acting

To put it nicely, some of us (myself included) suffer from an occasional variance in velocity between thoughts and words. This can lead to many a party spent trying to remove the proverbial foot from the overactive mouth.

This phenomenon extends to the public cloud, where the ease with which individuals can distribute information – including sensitive data – is vastly improved. Oversharing is a common source of unintentional data externalization. To improve this, be sure both you and your users understand the granularity of sharing criteria available, as well as the associated security implications.

Book A Physical

Whether we’re talking about your body, your vehicle, or your information infrastructure, everyone feels more at peace after a check up. So get yours for a true measure of the security integrity of your cloud environment – get started with a no-cost (and commitment-free) security assessment from CloudLock, where we’ll:

  • Provide metrics, considerations, and recommendations regarding the security of your cloud platforms
  • Recommend actionable next steps for institution Acceptable Use Policies (AUPs)
  • Compare your Security Score to other customers

Get Started Today!

CL_blog_CTA_Security-Assessment

Share
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close