ArticlesCloudWinter 2020 Mass Move to the Cloud – 3 Essential Tips for Cloud Migration by Dan Simmons December 9, 2020 written by Dan Simmons [vc_row][vc_column][vc_column_text]Cloud technology has become indispensable for many organizations, however there are common mistakes and misconceptions that you should be aware of in order to keep your data secure, even as it travels off premises.[/vc_column_text][vc_video link=”https://youtu.be/l7n2AIlMGls” el_width=”60″ align=”center” css_animation=”bounceInUp”][vc_column_text]Moving to the cloud has a wealth of benefits both in terms of business resources and information. If one were to investigate the systems or applications being used by their organizations, you could guarantee that at least one is using cloud technology. And there are plenty of good reasons for it. A recent survey shows that businesses are recouping fiscal savings, seeing an accelerated time to market as well as an increased responsiveness to customer needs after moving to the cloud. This in turn promotes more revenue streams for the business, not to mention the improved overall efficiency and productivity. Yet, despite this, the cloud is a concern for modern security professionals, particularly as more data is being stored in these architectures, leading to more data security and privacy risks. In fact, 93% of cloud deployments have been found to be running misconfigured storage services. As a result, 200 cloud security breaches have occurred since 2018, which have exposed over 30 billion data records. Given that more enterprises are looking to adopt cloud infrastructure, if these issues are not rectified, the likelihood of more breaches is high as it is clear that many enterprises are struggling to effectively secure these digital environments. This could be down to a number of reasons including, among others, a lack of visibility regarding the data or even misunderstanding how cloud providers are storing and securing data. To help, here are three essential tips to keep in mind when moving to the cloud: 1. Chances are your CSP is only partially responsible for security. Most cloud service providers adopt a shared responsibility model. What this means is it’s the customer’s responsibility to secure data stored in the cloud. The cloud provider will have security in place, but these need to be configured to the specifications and requirements of the customer. Of course, each cloud provider will have various security tools and capabilities which can lead many down a road of unmanageable inconsistency. You’ll have to take the time to review the configurations and can’t expect this task to be done for you. 2. Legacy, on-premises technologies are not engineered to manage and control cloud security. More often than not, legacy security technologies will not have the required capabilities to meet the high demands of modern cloud infrastructures. For modern, cloud-native environments, a new security approach is needed – one that gives total visibility, protects data throughout its lifecycle, and can enable the business to carry out its processes without compromising the data. 3. A data security expert is not automatically a cloud security expert Have you ever gotten into an argument with someone who’s got a PhD in chemistry who thinks having a PhD in chemistry makes them an expert in topics other than chemistry? Lord knows I have. This same false sense of security can also apply to seasoned data security experts when it comes to cloud security. Modern cloud services are more complex and these new environments demand more automation to handle the vast amounts of data. This then calls for new approaches to protect the sensitive information that resides in these channels. This alone will require deeper understanding. To help your organization with its commitments to data security along its cloud migration journey, data-centric security should be at the forefront of any discussion. The data-centric approach will help give total visibility of data in all forms as well as protect and de-protect sensitive information based on access rights. The technology that most incorporates this high standard of protection is tokenization which negates any exposed gaps that may have appeared when using traditional security approaches. If more organizations adopt this data security strategy for their cloud environments, we will begin to see a drastic decrease in the number of cloud security incidences. Secure data before it hits your cloud applications Check out this fact sheet to learn how to secure all your sensitive data intended for cloud destinations without disrupting your business processes. If you still have questions, you can get in touch with us here. Download Fact Sheet [/vc_column_text][/vc_column][/vc_row] December 9, 2020 0 comment 0 FacebookTwitterPinterestEmail
ArticlesDataWinter 2020 When it comes to Digital Transformation, Don’t Forget Security by Neil Correa December 8, 2020 by Neil Correa December 8, 2020 Digital transformation (DX) is the natural evolution of traditional business operations allowing organizations to capitalize on the full capabilities of our technological advancements, meet consumer expectations and keep competitors at bay (or at least be on par with them). DX isn’t just a cookie cutter deployment of on-prem systems migrated … 0 FacebookTwitterPinterestEmail
ArticlesSecurityWinter 2020 Confronting Inaction in the CyberSecurity Industry by Steve Tcherchian December 8, 2020 by Steve Tcherchian December 8, 2020 2020 was another troubling year in the cybersecurity world. We saw a repeat of 2019’s data breaches on a larger scale. Instagram, TikTok, YouTube, Nintendo, WaWa, and many more fell victim to some sort of compromise. 0 FacebookTwitterPinterestEmail
ArticlesWinter 2020 Be Better Prepared for Black Swan Events with Digital Transformation by Deepak Belani December 8, 2020 by Deepak Belani December 8, 2020 A black swan event is an incident that is unpredictable and has widespread ramifications – and, after it occurs, many say it actually was predictable. Examples of recent black swan events include the dot-com crash in 2000, the September 11, 2001 terrorist attacks, and the 2008 global financial meltdown. … 0 FacebookTwitterPinterestEmail
ArticlesCloudDataWinter 2020 Reinventing the future of work for SMBs by Sandy Ono December 8, 2020 by Sandy Ono December 8, 2020 At a time when we are all reinventing the way we work, learn how HPE Small Business Solutions can help you reinvent your workplace, your workflow, and your workforce with greater simplicity, security, and flexibility. 0 FacebookTwitterPinterestEmail
ArticlesWinter 2020 Zoom Security Settings You Need to Check Right Now by Beth Ziesenis December 8, 2020 by Beth Ziesenis December 8, 2020 Newsflash: Zoom bombing is still a thing. This week I was in a session that was hijacked by horrible people sharing porn, racist language, disgusting images and vile language. Here’s how you can avoid the same issues. Note: some of these settings and options are for different levels of … 0 FacebookTwitterPinterestEmail
ArticlesData SolutionsWinter 2020 Reflections on NIST SP800-160 Vol 2: Developing Cyber Resilient Systems by Jill Walsh December 8, 2020 by Jill Walsh December 8, 2020 It’s near the end of 2020 and amidst COVID-19 challenges, the need for cyber resiliency is top of mind. Our capacity to recover from physical and emotional health issues and economic fallout is being tested on a broad stage. In the Security space, we are extending our conversations about resiliency … 0 FacebookTwitterPinterestEmail
ArticlesData SolutionsWinter 2020 Möbius Partners and Rent-A-Center: Virtual Machine Migration by Ryan Massey December 8, 2020 by Ryan Massey December 8, 2020 As part of a major data center relocation project, Rent-A-Center (RAC) needed assistance migrating existing virtual machines (VMs) from one vCenter located in its current data center to a new vCenter server in the new co-location facility data center over the wide area network. The migration of systems running … 0 FacebookTwitterPinterestEmail
ArticlesWinter 2020 Sound with a vision: What our planet is telling us by Hewlett Packard Enterprise December 8, 2020 by Hewlett Packard Enterprise December 8, 2020 The crushing groan of a glacier. The reverberating explosion of a thunderstorm. A midnight choir of tree frogs in the rain forest. These are the immersive sounds that researchers at Purdue University’s Center for Global Soundscapes are inspired by. And for good reason: By listening to our planet, we … 0 FacebookTwitterPinterestEmail
ArticlesArtificial IntelligenceWinter 2020 An Overview of Artificial Intelligence and NonStop by Justin Simonds December 8, 2020 by Justin Simonds December 8, 2020 Alan Turing OBE (Officer of the Order of the British Empire) FRS (Fellow of the Royal Society) born 23 June 1912 and died 7 June 1954 was an English mathematician, computer scientist, logician, cryptanalyst, philosopher and theoretical biologist, or what we would call today an under-achiever. Mr. Turing was highly influential … 0 FacebookTwitterPinterestEmail