Cloud security: The top tips from the experts

Stuart Sumner
clock • 23 min read

Computing asked the experts for their top tips to help businesses use the cloud securely. Here's what they said

Most organisations embrace the cloud today, with the speed and flexibility of as-a-service offerings proving irresistibly attractive.

And even those who believe their organisations should remain stubbornly out of the cloud will often find cloud services in use somewhere within their own networks.

Whether it's employees using their personal DropBox accounts to enable seamless home and office work, or perhaps people sharing corporate files via their own Gmail accounts when the corporate email goes down, it's almost impossible for any sizable organisation to stay completely cloud-free.

But one commonly-cited issue with corporate cloud use is security, with many firms uncomfortable with the idea of someone else having at least partial responsibility for their data.

So with that in mind, Computing spoke to the experts, and compiled their best advice into easily digestible sections below.

Here are the top tips from the experts.

First, once you've decided to take the plunge, it's important to work out which applications or data will best fit the cloud, what to move first, and where it is likely to reside.

Rob Norris, director of enterprise and cyber security in EMEIA at Fujitsu.
"Businesses should first focus on critical data. This should be done by identifying the data that needs to be protected, where it's going to be moved to and used within the cloud, and then ensure that the controls available to businesses through cloud providers are sufficient.

"Businesses must understand where their data resides at a national level, who could view that data, and what is contractually in place to control that access, to properly address legislation around protecting personal data - as that will always be present in the cloud."

You may also like
Lazarus uploading malware to open-source PyPl software repository

Threats and Risks

Supply chain attack leaves developers in Asia at particular risk

clock 12 March 2024 • 3 min read
Hugging Face AI platform infested with 100 malicious code-execution models, researchers warn

Threats and Risks

These models could create a persistent backdoor for attackers

clock 01 March 2024 • 3 min read
Operation Cronos: NCA reveals details of LockBit affiliates

Threats and Risks

Operation has been crippled - for now

clock 22 February 2024 • 3 min read

More on Cloud and Infrastructure

WebAssembly heralds 'third wave of cloud computing'

WebAssembly heralds 'third wave of cloud computing'

Wasm: 'Speed and agility is the name of the game'

John Leonard
clock 26 March 2024 • 3 min read
Microsoft the latest to waive cloud egress fees

Microsoft the latest to waive cloud egress fees

TS&CS apply

John Leonard
clock 14 March 2024 • 2 min read
'A lot of confusion': Unpicking SAP's recent changes

'A lot of confusion': Unpicking SAP's recent changes

SAP and Lemongrass talk S/4HANA migration deadlines, RISE and AI

John Leonard
clock 27 February 2024 • 6 min read