3 tips to improve security by monitoring cloud applications
- ConsenSys and AMD develop blockchain-based cloud computing infrastructure
- Google Drive, Apple iCloud and Dropbox: Which is the best cloud storage?
- Benefits of ERP technology in cloud computing
- 5 reasons why enterprises should use cloud computing
- The combination of cloud computing and virtual private network
- Microsoft arrangements to utilize ARM chips for cloud computing
- Cloud computing - A simple explanation
- Adobe earns big on 'the cloud'
- New Window Server: Breakthrough on cloud security (Part 2)
- New Window Server: Breakthrough on cloud security (Part 1)
Digitizing changes the way jobs are done today. Important business applications and data could be found with a single click. Perhaps this familiarity makes employees feel that there is some "connection" to the data. Switching jobs, they often keep this information with them. In other words, that could be the reason they don't think this is an illegal act.
Whatever the reason for deliberately taking this data can affect the development and advantage of a business's competitiveness. But with a clearer view of these security threats, organizations can repel these bad factors and improve the overall security of the system.
Below are 3 important tips that businesses can use to control data security through cloud applications by paying more attention to some details.
1. Look at the login activities
Digging into when, where and who logs into the system will most likely create some surprises in interacting with applications. Accounts that are no longer used if not properly deactivated on the system will continue to offer access to sensitive data. These accounts may belong to users who have changed their jobs or third party, partners... Logging operations show the users' location, time, device and other information that that can help us find potential security holes.
Businesses can keep their data safe from people who should not have the right to access it, such as former employees, by tracking this login. Even current employees may log into the system after work, trying to get important information for their own purposes.
2. Control what is retrieved
Retrieving reports is an easy method that many employees can try to export a large amount of sensitive data out of the system. Users can run reports almost for everything, from customer contact information to existing deals, and then use those reports for analysis, presentation or reference.
The downside of this convenience is that this can create a flaw in the enterprise that facilitates information stealing. Employees who are about to leave may export these data, or customer list for competition purposes.
But if a company can monitor this retrieving process, it can:
- Protect its customers, partners and potential information, which can improve the trust of the company's customers and meet security rules and regulations (like PCI-DSS).
- Find out who want to take these data for personal or financial purposes and prevent data from being lost before possible disadvantages.
- Reduce the severity and cost of data loss by quickly finding and correcting data retrieval.
- Find out the cases where its accounts are abused and disabled.
3. Examine the retrieved reports
Many companies focus on efforts to improve security by checking out exported reports, but running reports can create search security issues. The principle of least privilege ensures that all accounts are allowed only the most necessary and minimum rights to complete their work - and that can be applied to data that they are entitled to view. But many companies allow a wide range of access to multiple data areas of the business, and even the right to view data that has nothing to do with the main job.
The scope of work should be an important consideration to create the right to access appropriate reports. If you look at the exported reports, the most retrieved reports and the number of reports, you can control users who access data outside their work.
The third benefit comes from tracking personal reports and unsaved reports, which can help prevent any security issues created by users while trying to retrieve data without leaving any trace. They could be those who are trying to steal data, those with higher access rights than necessary, or those who accidentally run reports. Tracking these reports helps businesses recognize security vulnerabilities.
By: James Paquin