{"id":5522,"date":"2018-12-04T22:56:10","date_gmt":"2018-12-05T05:56:10","guid":{"rendered":"http:\/\/clikcloud.com\/?p=5690"},"modified":"2018-12-05T00:42:51","modified_gmt":"2018-12-05T07:42:51","slug":"tackling-security-in-the-cloud","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/","title":{"rendered":"Tackling Security in the Cloud"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Over the last ten to fifteen years, the cloud has gone from new technology to accepted&#8211;and by many, embraced&#8211;fact. According to a recent CompTIA <\/span><a href=\"http:\/\/www.comptia.org\/resources\/comptia-research-market-intelligence-overview-study-summary-booklet-2018\"><span style=\"font-weight: 400;\">study<\/span><\/a><span style=\"font-weight: 400;\">, cloud computing is now a critical part of today\u2019s IT operations, powering everything from Cloud Backup to handling email and other commonly used applications. With this growth, as well as the growth of cybercrime, cybersecurity is an ever-present concern. Read on to find out about cybersecurity considerations in cloud computing. <\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Keeping Data and Applications Safe in the Cloud<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Many businesses are storing their data and applications in cloud data centers, or in a hybrid (part cloud, part on-premise) cloud environment. How can these resources be kept safe from cyberattacks? On-premise security measures can include keeping anti-virus and anti-malware definitions up to date along with operating system patches to keep cyber criminals from getting through. The considerations for cloud cybersecurity are a bit different. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">One consideration for a business is whether they want to have their data and applications in a public or private cloud environment. The public environment may do well enough for some businesses, but for certain highly-regulated fields such as healthcare, the private cloud environment is important to maintaing compliance. Or certain businesses can have some applications in a private cloud environment, but their email is hosted in the public environment. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whichever environment the resources reside in, data encryption is important as well. If a cyberattack occurs, encryption ensures that the information cannot be read and misused. Data must be safe both while in transit to the cloud and once it resides there. <\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The Role of Network Monitoring<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Finally, network monitoring is vital to cybersecurity, and can be done remotely twenty-four hours a day. Thanks to the cloud, employees can work from wherever they are, at any time of day. That can put the business\u2019 systems at risk from unsecured mobile access in public spaces or even from a worker\u2019s unsecured laptop or desktop when they work from home. Network monitoring by your service provider can help you proactively identify intrusion attempts and avoid an expensive data breach by alerting your business to potential problems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more about cybersecurity measures to keep your company\u2019s data and applications safe in the cloud, contact your technology advisor today.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last ten to fifteen years, the cloud has gone from new technology to accepted&#8211;and by many, embraced&#8211;fact. According to a recent CompTIA study, cloud computing is now a critical part of today&rsquo;s IT operations, powering everything from Cloud Backup to handling email and other commonly used applications.<\/p>\n","protected":false},"author":1,"featured_media":5524,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[183,5,100],"tags":[22],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tackling Security in the Cloud<\/title>\n<meta name=\"description\" content=\"Over the last ten to fifteen years, the cloud has gone from new technology to accepted--and by many, embraced--fact. According to a recent CompTIA study, cloud computing is now a critical part of today&rsquo;s IT operations, powering everything from Cloud Backup to handling email and other commonly used applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/\",\"name\":\"Tackling Security in the Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2018-12-05T05:56:10+00:00\",\"dateModified\":\"2018-12-05T07:42:51+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"Over the last ten to fifteen years, the cloud has gone from new technology to accepted--and by many, embraced--fact. According to a recent CompTIA study, cloud computing is now a critical part of today&rsquo;s IT operations, powering everything from Cloud Backup to handling email and other commonly used applications.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tackling Security in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tackling Security in the Cloud","description":"Over the last ten to fifteen years, the cloud has gone from new technology to accepted--and by many, embraced--fact. According to a recent CompTIA study, cloud computing is now a critical part of today&rsquo;s IT operations, powering everything from Cloud Backup to handling email and other commonly used applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/","url":"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/","name":"Tackling Security in the Cloud","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2018-12-05T05:56:10+00:00","dateModified":"2018-12-05T07:42:51+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"Over the last ten to fifteen years, the cloud has gone from new technology to accepted--and by many, embraced--fact. According to a recent CompTIA study, cloud computing is now a critical part of today&rsquo;s IT operations, powering everything from Cloud Backup to handling email and other commonly used applications.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/tackling-security-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Tackling Security in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5522"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=5522"}],"version-history":[{"count":1,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5522\/revisions"}],"predecessor-version":[{"id":5523,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5522\/revisions\/5523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media\/5524"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=5522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=5522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=5522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}