Blog | G5 Cyber Security

3 best practices to protect sensitive data in the cloud

On average, enterprises are using 80 separate cloud applications to collaborate, communicate, develop, manage contracts and HR functions. In 2020, 76% of enterprises ran their applications on Amazon Web Servers (AWS) and 63% ran apps on Microsoft Azure. Data breaches or leaks in third-party cloud services occur mostly because of misconfiguration and inadequate change control, such as excessive permissions, default credentials, poorly configured AWS S3 buckets, and disabled cloud security controls. CISO: Take control of cloud application usage and perform risk assessments in the planning stages of any new initiative involving public cloud services.”]

Source: https://www.csoonline.com/article/3611129/3-best-practices-to-protect-sensitive-data-in-the-cloud.html

Exit mobile version