Cloud security has so far focused on securing the data at the host site, as well as the security of the data across the corporate WAN. This may be sufficient for enterprises that use cloud services from the office, but this protection is not sufficient for users who have access to data stored in the cloud from unsecured public networks. As more and more broadband operators provide global connectivity, it is easier for users to access Enterprise Services from any Wi-Fi connection. Companies should pay attention to this potential threat. You can't secure every public network, but you can train users and prevent them from accessing cloud services or corporate data from an unknown network.
Dell: Cloud Computing-many companies are currently using cloud computing, which poses an unknown security threat and leads to targeted attacks on enterprise data and applications. The findings show that these hidden threats are highly risky. 73% of respondents said their companies were using cloud computing (90% in the US). Nearly half (49%) of respondents put cloud computing as an important security risk for the next five years, reflecting concerns about the future, and only 22% per cent said that data transfer to the cloud was a major security risk at the moment. Think of security as the main priority for next year's business, 86% is using the cloud. 21% of respondents believe that using cloud applications or services is the root cause of their security breaches.
McAfee: The deployment of cloud based enterprise applications will create new "attack surfaces" available to cyber criminals. Cyber criminals will seek more ways to attack the ubiquitous hypervisor in all data centers, the multi-tenant access and communication infrastructure implied in cloud services, and the management infrastructure for configuring and monitoring large cloud services. Because of the lack of adequate means to implement security measures to meet the needs of the enterprise, small businesses that purchase cloud-based services will continue to face security risks that cannot be addressed through the cloud service provider's user protocols and operating procedures.
Websense: Compared to data stored in the corporate network, cyber criminals focus their attacks on data stored in the cloud. This tactical shift follows the transfer of critical business data to cloud-based solutions such as Google, Microsoft Office 365, and confluence. They will find it easier and more profitable to invade a cloud that stores a vast amount of verse than an impregnable intranet.
There is no doubt that attackers will still invade the corporate network, targeting users, stealing information and hacking into the system. However, such attacks will serve as an intermediate step to gain access to the third cloud service rather than the internal data store.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.