3 Keys for a secure cloud provider cyber security strategy

August 21, 2024
1 min read


TLDR:

  • Cloud providers may offer better cybersecurity protections than many companies can provide on-premises.
  • Cloud service providers often have an edge in hiring and retaining skilled cybersecurity professionals.

In the article “3 Keys to ensuring your cloud provider offers a sound cyber security strategy,” the author highlights the importance of understanding what to look for in a cloud provider in terms of cybersecurity. With a shortage of skilled cybersecurity professionals globally, cloud providers can serve as a haven for organizations in need of robust cybersecurity measures. The author emphasizes three key elements to consider:

  1. The security professional shortage: Cloud service providers often have an edge in hiring and retaining skilled cybersecurity professionals due to the costs for security being baked into their business model.
  2. Defense in depth: A critical aspect to consider when vetting providers is their adherence to a defense-in-depth strategy, involving multiple layers of security protections to prevent breaches.
  3. Third party certifications: Prospective cloud providers should be asked about the third-party security certifications they’ve earned, such as SOC 2 and ISO 27001, which are indicators of sound security practices.

By focusing on these key elements and ensuring that cloud providers have the right certifications and strategies in place, organizations can enhance their cybersecurity posture and reduce cyber risks. As cloud services continue to play a larger role in enterprise IT strategies, IT leaders are advised to pay attention to their providers’ cybersecurity capabilities to safeguard their data and operations effectively.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives

Cyber insurance changes shape of security for good and bad

TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses