article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Sure, you need state-of-the-art cybersecurity technology like firewalls, anti-virus software, and intrusion detection systems to keep cybercriminals on the back foot. Companies can prevent social engineering attacks by steeping employees in cyber hygiene and warning them about the sneaky ways cybercriminals launch cyberattacks.

article thumbnail

Top Cloud Security Issues: Threats, Risks, Challenges & Solutions

eSecurity Planet

Conduct user awareness training: Incorporate a focused training program into onboarding and workflow process so employees can learn about social engineering strategies, phishing risks, and cloud security best practices. With few options, enterprises confront difficulties in reducing this risk while reaping cloud benefits.

Risk 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2024 Cybersecurity Industry Experts Predictions: Part 1

IT Security Guru

Mike Newman, CEO of My1Login: Cloud migration will expand the attack surface “In the last year organisations have continued to transform by moving more of their applications and data into the cloud. The entire technology stack is at risk.

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Anton on Security

To me, these statements together indicate that customers do not know how to configure cloud services securely (and a naive and “blamy” view is: this is their fault ). Yet I reckon that while they play a role in security incidents, they don’t plan an outsized role that cloud misconfigurations do. Is Your Fate In the Cloud?” “How

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Security Boulevard

To me, these statements together indicate that customers do not know how to configure cloud services securely (and naïve and “blamy” view is: this is their fault ). Yet I reckon that while they play a role in security incidents, they don’t plan an outsized role that cloud misconfigurations do. Is Your Fate In the Cloud?” “How