Connect with us

Hi, what are you looking for?

Tech & Science

Too few companies know if their cloud systems are secure

Cloud computing allows firms to cut costs and hassle by having outside firms host their data and provide processing power for certain applications - AFP
Cloud computing allows firms to cut costs and hassle by having outside firms host their data and provide processing power for certain applications - AFP

CloudSphere (a cloud governance platform) has released findings of its cloud survey report, which is titled: “In the Dark: Why Enterprise Blind Spots are Leaving Sensitive Enterprise Data Vulnerable to Breaches.”

The report was based on discussions with 303 IT professionals, looking at current cloud infrastructure access, governance, and management practices and why and how often unauthorized access occurs.

Looking into this report, the findings suggest that almost one-third of enterprises experienced unauthorized access to cloud resources. Furthermore, an additional 19 percent of large businesses stated they were unaware if unauthorized cloud access occurred. This is a large and concerning proportion.

The reasons for this unawareness has been found to be largely driven by poor enforcement of identity and access management policies within the cloud.

Identity and access management concerns those policies, processes and systems that need to be in place in order to support on-boarding employees to a set permissions within an information technology system. Different permissions provide different levels of access and the ability to perform various functions.

As things stand, 78 percent of enterprises claimed to be able to enforce identity and access management policies. In addition to this, 69 percent reported policy enforcement issues created unauthorized access.

Not all of the news is bleak. The report finds that 80 percent of companies have developed their own cloud governance policies internally. Furthermore, 53 percent of companies reported 100 or more individuals have cloud access across numerous internal and external teams. The concern here, however, is that the majority of which have no security specific expertise.

A further issue that requires addressing at the corporate level was that just 50 percent of businesses indicate they review access policies and privileges monthly. In order to keep control, businesses need to put in place systems that permit greater checking.

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Entertainment

Albert Rudnitsky is a director and actor based in New York City. He spoke about directing "Crimes of the Heart," which is being performed...

Social Media

China rebuffed on Thursday a suggestion from US President Donald Trump that he might offer to reduce tariffs on the country.

Life

Though surveillance of the public using CCTV is common in many areas around the world, video surveillance has generated significant debate.

Tech & Science

The $675K investment in QAI Ventures aims to build a pipeline of quantum-ready founders and companies rooted in the ecosystem.