Secure your business

Where's our data? Secure steps for cloud storage

Highlights
  • It’s vital to involve HR, sales and marketing in planning cyber security strategies since they handle employee and customer data.
  • Shadow IT is the collection of programs your employees add to the network without approval from central IT.
  • To stop a data miner or ransomware compromising your entire cache, it’s important to segment your network in the cloud.

In any digital transition, your team is bound to ask exactly where the data is - like you, they'll want to know it's safe and secure.

The first part of your answer is easy: the data is in a flexible cloud where it’s easy to find, move and configure within the server. However, the next part is a little more complex: it’s in a flexible cloud, where it’s easily found, moved and configured by anyone who gains access. 

Two men watching security footage

The front line

Moving to the cloud involves planning how to secure and store your data, and it’s important that every vertical in your business is engaged. Think about all the people who can touch your data - from the HR department safeguarding your employees’ personal data, to the marketing and sales department who control the highly-regulated customer data produced by your CRM system.

Reaching out to these departments is vital when planning your security strategies to ensure they can easily integrate their data into the new setup. For external-facing departments, it’s also important to take feedback on how to streamline experiences for your customers.

 The back end

Shadow IT can be a major risk to your cloud’s security. This is the collection of programs and applications that your employees adopt and add to your network without the knowledge of central IT. Without IT approving these programs – and ensuring they’re kept up to date with security patches – they can present a hidden trap-door to your network.

To combat the problem, establish a strong policy governing which programs can (and cannot) be uploaded onto the network. This policy should be enforced with periodic network audits, and requiring programs such file sharing services, which communicate outside the network to be individually whitelisted. 

Another way to prevent hackers hopping onto your cloud is to deploy a Cloud Access Security Broker. This program acts like a bouncer: it sits between the cloud and those looking to access the it, and enforces an enterprise’s security policies on any connection.

While programs connecting to the cloud go through a security checkpoint, once they’re past that gateway they can potentially move and act unchecked. Lateral, “east/west” data flows, through cloud and virtual environments allow data to effectively bypass perimeter security defences. 

Cloud environments are particularly conducive to east/west data flows between virtualised applications and network sectors. 

To stop a data miner or ransomware potentially compromising your entire cache, it is important to segment your network (including applications and users) using virtual secure gateways in the cloud itself. This will allow your IT department to monitor how data is moving through your cloud networks and provide them with vital screening capabilities to ensure it stays where it should be. 

Find out how to keep your data safe with our Cyber Security Health Check.

Find out more

Related News

Boxes on conveyer belt
Create transformative innovation
Create transformative innovation
IoT in focus: Transforming the supply chain

The Internet of Things (IoT) is powering a major digital transformation in supply chain management that's set to touch every part of the chain from floor to store and beyond. ...

Woman on her phone in an office setting
Liberate your workforce
Liberate your workforce
Making the switch to an IP-based telephony service

As traditional ISDN and PTN phone lines are decommissioned with the rollout of the National Broadband Network, Australian businesses need to find the right IP-based telephony s...

People standing around a workspace using a laptop
Optimise your IT
Optimise your IT
Fast, resilient and virtual: Our network for tomorrow

To meet Australia’s increasing demands for data, speed and network resiliency, Telstra is reimagining our network with software, virtualisation and 5G. The last decade has see...

tennis stadium
Reach global markets
Reach global markets
Over-the-top content with WTA and Perform Group

Across the world, sports fans are demanding higher quality video, with less delay and more features than ever before. We explore how the convergence of IP and traditional broad...