Cloud Security Tips: Beware of Endpoint Vulnerabilities
Think cloud solution security, and most of us think about back-end security. In fact, all sorts of cloud security questions will come to mind. For example, how secure are the access controls and physical surveillance for the data center? Does the data center have strong fault tolerance for its server infrastructure? Does the cloud provider have good encryption and data partitioning technology to shield client data? Sure, these are all important factors in cloud security, but they leave out one weak point: people — the everyday users of the solution.
Here's What You Need to Know About Cloud-Based Endpoint Vulnerabilities:
Top Endpoint Vulnerabilities
If your users aren't educated around security best practices for connecting to cloud solutions, your business could be compromised. Here’s a short list of questions to ask and vulnerabilities to be aware of:
Is anti-virus and security software installed and maintained on the various devices users leverage to log onto the cloud solution? You can have the best security on the back-end, but if keystroke loggers or other malware latches on at the device level, business data is put at risk.
In the mobile era, people are logging on to cloud solutions at coffee shops, restaurants, and at-home WIFI networks. It’s important for users to realize that the use of an unsecured wireless network is a risk and must be avoided.
Are users being allowed to set up passwords to cloud solutions that aren’t strong enough? Are they simply repeating the same password they use for other sites?
In some cases, it might take more than user training to protect the endpoints to the level you want. For example, perhaps some power users should be issued tablets, laptops, or other devices by the company so that IT staff can manage the devices and ensure endpoint security is rock solid. Perhaps you should work with your cloud solution provider to make it impossible to configure a weak password, or even make it necessary to use two-factor authentication to log onto the system—a safeguard used by the likes of Microsoft, Amazon, Apple, and many others. At some companies, access to cloud solutions is being handled through a corporate network infrastructure which then connects to the cloud solution, providing an extra layer of security.
Hackers and other threats will take the path of least resistance. That’s why protecting the endpoints is so important. The data center used by your cloud provider can have a locked metal cage and a guard protecting the solution’s servers. But if an employee’s device is easy pickings, that’s all it takes to put the entire business data at risk. Bottom line: treat the endpoints to the cloud as an extension of your enterprise. Make sure your users are educated on the security measures they should be taking, while you take additional safeguards beyond just the training, such as enforcing stronger passwords.
Remember, that the cloud model is great for productivity, collaboration and more, but requires a common-sense approach to security—at multiple levels. If you're ready to upgrade your IT infrastructure with cloud resources, reach out to iCorps for a free IT consultation.