Let’s dust off the old notepad and put on our optimist hats. That’s right, it’s time for new year’s resolutions.
Shed Excess Weight
As we regain consciousness following our holiday dinner-induced food comas, gym membership registrations skyrocket. And while we’re on the topic of shedding excess, why not take the same approach to security operations?
How many different screens do your security ops staff need to navigate every day? If it’s a one-to-one relationship with the amount of cloud platforms in your organization (for example, one for Google Apps, one for Salesforce, one for Dropbox, etc.), it would be safe to say there is an impact on the efficiency and effectiveness of your security program. Ditching a patchwork of niche, single-platform security tools in favor of a unified security fabric helps improve both.
If It’s Worth Doing, It’s Worth Doing Right
Of all the overused idioms, this one always stuck with me. On the security front, that means bridging the gap between “check-box” security and compliance initiatives and a true, comprehensive information security program.
With the endless torrent of headline-worthy breaches coupled with the concern of audit failure, this means security professionals must understand their infrastructure to a greater extent than cybercriminals and auditors – and then take the necessary steps to achieve a superior level of security.
Be Kind to Others
There’s much to be gained by exercising compassion for others when determining a course of action. In security speak, this translates to understanding the impact your security program has on end-users.
We see programs that run the gamut from cumbersome and disruptive blocking strategies to measures that empower users to accomplish their business objectives as efficiently as possible. But which is more secure? Let’s consider the following: who is more likely to hop on their phone’s wireless hotspot to inject sensitive corporate data into unsanctioned and unmonitored platforms. Businesses with people-centric security programs enjoy both increased productivity and security. Let’s be kind in 2015.
Think Before Acting
To put it nicely, some of us (myself included) suffer from an occasional variance in velocity between thoughts and words. This can lead to many a party spent trying to remove the proverbial foot from the overactive mouth.
This phenomenon extends to the public cloud, where the ease with which individuals can distribute information – including sensitive data – is vastly improved. Oversharing is a common source of unintentional data externalization. To improve this, be sure both you and your users understand the granularity of sharing criteria available, as well as the associated security implications.
Book A Physical
Whether we’re talking about your body, your vehicle, or your information infrastructure, everyone feels more at peace after a check up. So get yours for a true measure of the security integrity of your cloud environment – get started with a no-cost (and commitment-free) security assessment from CloudLock, where we’ll:
- Provide metrics, considerations, and recommendations regarding the security of your cloud platforms
- Recommend actionable next steps for institution Acceptable Use Policies (AUPs)
- Compare your Security Score to other customers