{"id":8012,"date":"2016-11-17T07:13:59","date_gmt":"2016-11-17T07:13:59","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=8012"},"modified":"2021-06-25T12:47:21","modified_gmt":"2021-06-25T12:47:21","slug":"should-know-about-cloud-security","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/should-know-about-cloud-security\/","title":{"rendered":"What you should know about Cloud Security?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12092 size-full\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/11\/cloud-security-2.gif\" alt=\"\" width=\"1200\" height=\"628\" \/><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/should-know-about-cloud-security\/#Cloud_Security\" >Cloud Security<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/should-know-about-cloud-security\/#Security_in_Cloud_Computing\" >Security in Cloud Computing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/should-know-about-cloud-security\/#Be_secure_from_Hackers\" >Be secure from Hackers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/should-know-about-cloud-security\/#Ways_to_ensure_Security_in_Cloud\" >Ways to ensure Security in Cloud<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Cloud_Security\"><\/span>Cloud Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-size: medium;\"><b><span style=\"color: #16255c;\">Security is an important parameter for the functioning of any organization in today\u2019s IOT world. Let\u2019s review about security breaches and steps to mitigate them.<\/span><\/b><\/span><\/p>\n<p>We all are aware of the dangerous harm that viruses can cause to enterprise IT. The trojan and malware attacks can cripple the organisational IT.<\/p>\n<p>Apart from the traditional viruses, trojans and malware; the most dangerous <a href=\"https:\/\/www.esds.co.in\/backup-recovery\"><strong>security<\/strong> <\/a>threat in the modern world are hackers.<\/p>\n<p>A successful cyberattack can bring IT operations (or related) to a standstill for hours, also days and weeks, depending on the severity of the attacks. The financial damage and reputational damage can continue much longer making the organisation very difficult to bounce back.<\/p>\n<p>Studies show that about 71% of small and middle sized organisations fall prey to attacks of cyber criminals.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8015 size-full\" title=\"biggest threats to organisations\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/11\/cloud-security-inner-image.png\" alt=\"cloud-security-inner-image\" width=\"508\" height=\"383\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/11\/cloud-security-inner-image.png 508w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/11\/cloud-security-inner-image-150x113.png 150w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2016\/11\/cloud-security-inner-image-300x226.png 300w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/p>\n<p style=\"text-align: center;\"><cite>Ref:\u00a0 CIO and Leader article<\/cite><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Security_in_Cloud_Computing\"><\/span><span style=\"color: #196682;\">Security in Cloud Computing<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>We now live in the Cloud era where majority of services we use, dwell in the Cloud. Subsequent to the benefits such as efficiency and cost-saving, the prime concern of<strong> <a href=\"https:\/\/www.esds.co.in\/enlight-cloud-hosting.php#horizontalTab5\" target=\"_blank\" rel=\"noopener noreferrer\">security in the cloud<\/a><\/strong>\u00a0cannot be overlooked. Initiatives like BYOD , IT departments can lose sight and control over the application, making IT more vulnerable to cyber attacks.<\/p>\n<p>Irrespective of the security protocols followed by the enterprises, the staff tries to download applications, softwares for professional purpose which they think are needed and useful for them making it \u00a0actually a hazard in disguise.<\/p>\n<p>We are using Cloud in all phases of life-be it professional or personal. The family photographs, official documents, critical client data are stored and accessed in the cloud.<span style=\"color: #196682;\">\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Be_secure_from_Hackers\"><\/span><span style=\"color: #196682;\">Be secure from Hackers<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Hackers do this act, because the information has some stake value, they earn their bread-and-butter from the hacks. With the advancement of technology , the hacking groups have become technically sound and sophisticated.<\/p>\n<p>Post breach, intangible slashes an organization suffers is loss of customer loyalty and market capital.<\/p>\n<p>In November 2014, the hacker world invaded Sony Pictures Entertainment and leaked confidential data like salaries, emails, high profile celebrity personal information and copies of unreleased films.<\/p>\n<p>We can\u2019t forget the Ashley Madison hack in mid-July 2015 where hacker group penetrated into the servers to get information of 37million online users. They got access to PayPal accounts, windows passwords and names of the people using this &#8216;personal space&#8217; site.<\/p>\n<p>Lately, a popular smartphone game \u2018Clash of Kings\u2019 forum was hacked (July 2016), giving access \u00a0to data \u00a0of about 1.6 million users. The mobile data, social network data and other critical data was put to risk.<span style=\"color: #196682;\"><br \/>\n<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Ways_to_ensure_Security_in_Cloud\"><\/span><span style=\"color: #196682;\">Ways to ensure Security in Cloud<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>To be safe and secure, CIOs and CISOs can\u2019t blindly trust the third party cloud vendors.Even the approved and renowned cloud vendors should be scrutinized, on regular basis, to check whether they meet up to your demands! Understand how the cyber criminals are kept away from your data, the level of security and liability of cloud service provider in case of any breach.<\/p>\n<p>Make it a practice to scan IT systems at regular intervals and the risk assessment is done periodically.<\/p>\n<p>Scan the corporate website with<strong> <a href=\"https:\/\/esds.co.in\/security\/vtmscan\" target=\"_blank\" rel=\"noopener noreferrer\">website scanning tools<\/a><\/strong> like <strong>ESDS VTMScan<\/strong> which not only detects the vulnerability but also tests with minor attacks. Update software used for organizational purpose like CMS, OS, Antivirus etc.<\/p>\n<p>To bounce back immediately after the security breach or mitigate the effect due to cyber attack, a functional incident response team is vital. The team will work in two phases viz.\u00a0 planning phase and response-recovery phase post attacks.<\/p>\n<p>Cloud Storage is cheap but the data is valuable. So next time when you find a flaw in security, fix it immediately.<\/p>\n<hr \/>\n<p>Speak to our cloud experts and know how your data can rest securely in eNlight Cloud. <a href=\"tel:1800 209 3006\"><strong>Click to call<\/strong>.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Security Security is an important parameter for the functioning of any organization in today\u2019s IOT world. Let\u2019s review about security breaches and steps to mitigate them. We all are aware of the dangerous harm that viruses can cause to enterprise IT. The trojan and malware attacks can cripple the organisational IT. Apart from the&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/should-know-about-cloud-security\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":34,"featured_media":9157,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[15,1271],"tags":[],"class_list":["post-8012","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","category-security-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/8012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=8012"}],"version-history":[{"count":25,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/8012\/revisions"}],"predecessor-version":[{"id":12093,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/8012\/revisions\/12093"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/9157"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=8012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=8012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=8012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}