Staying Safe In The Cloud

I’m sure by now your company has you working with some cloud applications like Microsoft 365, Google Docs, Dropbox and Salesforce just to name a few. You need to be vigilant because hackers can use tactics to trick you into fake landing portals. 

Did you know that Nearly 80% of organizations have experienced a cloud security hack in the past 18 months? Did you know $4.41 million is the average cost for an organization when its cloud services are hacked? Also, cloud-based cyberattacks rose 630% in a recent 3-month period. Obviously cybercrime is on the rise and hackers find creative ways into tricking you.

 

There is no such thing as a completely safe cloud provider and the way you go about using the cloud can have a significant impact for your organization. In these four scenarios, we will explore the security risks and tips associated with each.

 


Scenario 1

Your organization uses Google Drive for storing its files, but you prefer Microsoft’s cloud storage instead, so you decide to save your work files there.

Risk

Using non-approved cloud providers can lead to security gaps. Your IT team is responsible for maintaining your organization’s resources, so if your work files are stored elsewhere, they can be lost or exposed and your tech team can’t do their job.

Security Tip

Only use your Tech Team approved services for work and never store organizational data in a random or your personal cloud.

 


Scenario 2

So you have a potential customer and they ask to view some marketing materials, so you share cloud access with them.

 

Risk

When sharing with others, cloud services can give broad access to files. This means they might be able to see all the files within that drive, not just the ones shared.

Security Tip

Make sure to only share access to specific file(s) you intended and remember to revoke that access once it is no longer needed. With some cloud services you can even set an expiration date.

 


Scenario 3

Everyone wants to increase productivity and you found and installed an add-on for your organization’s cloud-based word processing software that auto-corrects your grammar.

Risk

Plug-ins, extensions, or other add-ons typically require you to agree to additional terms of use. Doing this could potentially allow the provider to take ownership of anything created using the service.

Security Tip

Always check with your IT Team before installing or using ANY additional software associated to any platform.



Scenario 4

You receive an email indicating your cloud username and password have expired, and you need to use the link included to update your information.

 

Risk

Hackers are always looking to deceive you. Falling for their tricks can give them access to confidential information stored in the cloud.

Security Tip

Make sure you stop, look, and think before you take any action, like providing your username and password or clicking on links that seem suspicious. Also ask your IT Team to enable email Multi Factor Authentication (MFA). It will stop hackers in there tracks from logging into your email account. 

 


Follow Policies and Procedures

Your organization has policies and procedures in place to protect its data. Always follow them! If your business does not have anything in place feel free to contact me and I will assist you to get your Policies and Procedures in order. 


Leave a Comment

Stay Informed

Receive instant notifications when new content is released.