Cloud computing, as a rapidly growing technology, leads the ranking of emerging risks for companies. It is followed by high penalties for the new general data protection regulation and social engineering attacks.
It is clear that cloud computing provides multiple advantages in the digital transformation of companies, among them, agility in managing large volumes of data and speed in the launch of applications. Unfortunately, migration to the cloud brings new vulnerabilities and threats to information security. This is how it is understood by the senior IT executives interviewed by the consulting firm Gartner, who have been asked about the main concerns regarding computer security and business continuity.
Table of Contents
The greatest risk of cloud computing lies with the users themselves, that is, the companies that contract cloud services. Suppliers guarantee the availability and confidentiality of the data residing on their servers but do not control their management. Protecting information in virtualized environments, with user authentication, encryption and decoupling of data, is essential to close security gaps.
IT specialists express as another concern the high fines related to the new general data protection regulation. Until May 25, people’s unequivocal consent to use their private data was a topic of relatively little concern. However, companies can now face penalties of up to 20 million euros or 4% of their turnover, for non-compliance with regulations.
Facebook and Google, for example, became the first companies to be denounced for “forcing consent” to their users, in order to continue using their services. “In addition to the economic losses derived from the fines, the impact in terms of reputation and trust of the claims will directly affect the viability of the business,” the respondents conclude.
The most powerful social engineering attacks target email (phishing), our mobile (vishing), social networks, USB hardware (baiting) and text messages (smishing). Cybercriminals take advantage of our bad and insecure habits of use to introduce malware into systems and infrastructures such as the cloud, further weakened in the event of non-existent identity, incident and vulnerability management policies.
Productivity is the amount of practical work done at a given time. This quantity of… Read More
The landscape of work is rapidly evolving, and coworking spaces have emerged as a defining… Read More
IT security has become a significant issue for businesses, whatever their size. Cyberattacks are becoming… Read More
Logistics is a significant part of supply chain management. It plays a key role in… Read More
As someone who has been in sales for over ten years, I know firsthand how… Read More
A new generation of workflow automation tools aims to – at least partially – automate… Read More