Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

1 in 5 Data Breaches Are Caused by Misconfigured Clouds

To accommodate remote work and improve efficiency, 85% of IT organizations are considering or already using the public cloud. However, with some of their most crucial data still located within the corporate perimeter, NetOps must come up with new ways to achieve seamless integration. While the transition to the cloud itself is tricky, protecting the assets inside it is a different problem.

A study by Ponemon and IBM indicates that misconfigured cloud servers are responsible for 19% of data breaches and increased their average cost by half a million dollars. Despite relying on multi-cloud infrastructure, 52% of organizations find it challenging to secure data stored in the public cloud.

Recommended AI News: Vimeo Unveils New Corporate Video Library To Keep Teams Connected

Companies accept these shortcomings, as cloud computing increases effectiveness and visibility over complex networks. Particularly when most employees are working remotely and accessing resources from dispersed locations. Cloud computing also takes the workload from on-premise networks that often have limited capabilities to support mobile workforces.

“Disperse edge computing is an opportunity for small and medium IT companies because robust corporate infrastructure is no longer needed for effective and secure collaboration. Enterprises also reduce additional costs by following Bring-Your-Own-Device (BYOD) policies, but that requires thorough risk-mitigation strategy based on authentication,” says Juta Gurinaviciute, the Chief Technology Officer at NordVPN Teams.

Software and IT companies secure their remote workers’ end-point devices, cloud apps, servers, and on-premise data centers by implementing Zero Trust frameworks.

Related Posts
1 of 30,447

Recommended AI News: Tenstorrent Raises over $200 million at $1 billion Valuation to Create Programmable, High Performance AI Computers

Instead of focusing on user-to-network connectivity, it secures user-to-application gateways. A software developer doesn’t need to enter the network to access cloud resources from their home office, allowing admins to limit the actions each employee can perform within the system.

IP whitelisting limits access and increases visibility

IP whitelisting (also known as allow list) is another step to reduce potential cyberattack surface area. It is an approved list of trusted IP addresses that can enter the network or reach resources within it. Usually, administrators assign static and dedicated IP addresses to all employee devices to control access to high-risk software development environments.

“The software and IT industry is particularly vulnerable to cyberthreats, as most of their operations are digital. Applications that are still in development rarely have proper security measures. Malicious users can access wider networks through them, compromising data, stealing assets and affecting operations,” says NordVPN Teams expert.

Recommended AI News: Majesco Acquires Market Leading Utilant LLC and Launches New Innovative Data and Analytics Business Unit

Comments are closed.