Weekly Top 5: Secure Cloud Collaboration
Secure Cloud Collaboration
Welcome to this week’s round-up of the latest news in Cybersecurity. This week we noticed an uptick in the discussions surrounding secure content collaboration, as well as potential GDPR ramifications for companies like Microsoft. And Kowsik Guruswamy from Dark Reading provides some insight into the pros and cons of sandboxing technology.
1. Cloudy With a Chance of a Breach
This article points to the importance of organizations being aware of security weaknesses of the public cloud, and more importantly, not assuming that every angle is covered. “The forecast calls for clouds, and they show no signs of clearing up. Cloud platforms are everywhere. In fact, IDG’s 2018 Cloud Computing Study showed 73% of all businesses have placed at least one application or part of their infrastructure in the cloud. The public cloud space is particularly hot at the moment as Google moves to aggressively compete with Microsoft and Amazon.”
Ronan writes, “The public cloud is attractive because underlying parts of the infrastructure and orchestration procedures hosting the application components are fully managed and mostly hidden — such as network functions, Internet access, security, storage, servers, and computing virtualization. Everything is easily configurable through a simple user interface or an API. Security is enforced by using private networks isolated from Internet… or is it?”
By: Ronan David, Published on Dark Reading
2. CIO on Data Privacy and Securing Sensitive Information Shared in the Cloud
One of our customers, Tri-Counties Regional Center, was gracious enough to offer a webinar with Information Security Media Group (ISMG), to discuss their journey with secure cloud collaboration, using Vera. The webinar explores the nature of file security and how you can quickly and easily secure sensitive data containing Personal Identifiable Information (PII) and PHI spread over a variety of systems. Tri-Counties explains how they leverage Vera for a single, seamless solution to persistently protect their patients’ information. Be sure to check it out!
Published on Information Security Media Group
3. 8 Steps to More Effective Small Business Security
This is a great article highlighting the fact that small businesses are also impacted by similar challenges as larger organizations, and gives 8 steps on how SMEs can start proactively protecting themselves, even with smaller security budgets. “Big cybersecurity challenges aren’t limited to large organizations. Small and medium-sized organizations are subject to the same vulnerabilities, exploits, and attacks that plague multinational enterprises. Unfortunately, these smaller organizations don’t have the same resources as the big companies to use to defend themselves. That’s why it’s critical that small organizations make the most of the cybersecurity resources they do have.”
By: Curtis Franklin, published on Dark Reading
4. Microsoft Products Under EU Investigation About Data Collection
The Dark Reading article reports that, “Microsoft products are under EDPS (European Union Data Protection Supervisor) investigation following a Dutch government report that expressed concern about data collection in Microsoft Office ProPlus, which contains popular software like Word and Outlook. It claims to have found eight GDPR violations in Office ProPlus and Office 365. EDPS plans to look into which Microsoft tools and services are in use among EU institutions and whether their Microsoft contracts comply with the newest GDPR changes.”
Published on Dark Reading
5. When Your Sandbox Fails
This is a great article written by Kowsik Guruswamy on Sandboxing technology. One thing we found interesting that’s worth repeating, “….sandboxing relies on detection. If a threat is able to mask itself, shut itself down, or evade detection in some way, it pretty much has free rein to infect users’ devices, enabling it to eventually make its way into the network and critical business systems. And that’s a problem. In a detect-and-respond cybersecurity strategy, once a threat gets past the front gates, it’s game over.”
Even though we have understood this about Sandboxes (and other perimeter defenses) for years, it bears repeating. While network security and perimeter defenses are necessary, with the growing use of cloud collaboration solutions, physical boundaries are dissolving. The more complex the IT environment becomes, the more difficult it is to protect the systems, devices, people, and networks handling corporate data. Sensitive data escapes through the gaps in defenses.
By: Kowsik Guruswamy, Published on Dark Reading
The Bottom Line
At Vera, we’re trying to close the data security gaps by protecting what really matters: the data itself. Vera secures sensitive data through its entire life cycle, everywhere it travels, no matter who has it or where it’s stored. Our goal is to protect confidential data at the point of its greatest vulnerability—when it’s being used by others and as it travels outside our perimeters into unmanaged domains, devices and applications.
You need to proactively and aggressively defend data by employing a relentless, always-on security posture that ensures maximum protection no matter how far your data travels outside of your organization. And you need to do it in such a way that makes it seamless to use and effortless to control who can access the information as well as what they can do with it.
Vera has been chosen by organizations of all sizes including General Electric, Silicon Labs, and Pokémon to secure data in their cloud collaboration tool.
If you’re interested in learning more, check out the white-paper on how to leverage modern cloud collaboration tools securely.
Director, Product Marketing