Cloud Security 101: Ready for Data Breach Threats?

Posted by John Lawler, Director of Cloud Professional Services

Oct 18, 2019


It’s a harsh reality: attackers of corporate IT change their tactics every day. The bad guys are one step ahead, becoming more clever all the time. We’re forced to catch up. But don't give up. You can proactively reduce your risk of a data breach.

A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.

Most domains have cloud security blind spots that make them susceptible to data loss. It doesn't even have to be something complicated and highly technical. A good example describes people getting speeding tickets that are sent from spoofed Police Department email addresses in Philadelphia so that malware can be downloaded. 

These transactional opportunities are nearly limitless when you start to think like a hacker. Couple that with the sheer volume of people they can target; rest assured they make a good living.

The risks companies face today are real, according to an annual Ponemon Institute research study in conjunction with IBM Security. The report, which examines breaches in 2018, reveals...

  • The average cost of a single data breach is $3.9 million
  • Data breaches in the United States are the most expensive at nearly $8.2 million. It was $7.9 million the previous year.
  • The average cost paid for each lost or stolen record is $150 worldwide but $242 in the United States
  • It takes an average of 279 days for companies to identify and contain a breach.

Shocking, isn't it? It appears mitigating data breaches is fast becoming a cost of doing business.

Security Audits and Other Steps to Reduce Risks

There are , however, precautionary and measurable actions and secure cloud solutions that can drastically reduce the risk of a successful hack on your domain.

  1. Educate Your Staff
    Security training should be built into your annual IT initiatives so that employees know what’s trending in social engineering — and how to maintain a secure corporate account.
  2. “Own” Your Devices
    Bring Your Own Device (BYOD) is commonplace in many industries. The cloud allows users to log in from any device. Less common though are policies and management platforms that can enforce device settings and allow the ability to wipe data remotely if lost or stolen.
  3. Put Security in Place Now, Not After an Attack has Happened
    Please don’t wait for an attack to react. Planning for security may not have been a part of your budget planning, but it will be more costly after the damage has been done. Whether you do the work internally or work with a partner, security should be a focus.

You can also minimize your risk by undergoing a cloud security audit for your domain, your Google Workspace (formerly G Suite) environment or SaaSOps applications and procedures. Onix can provide a comprehensive analysis of your system, optimization of your email architecture, change management services and security training for employees to ensure that you’ve addressed vulnerable areas.

The reality is, you will never be able to prevent all attacks. These masterminds are becoming more creative with many vectors to infiltrate your business. If they can’t penetrate the point-of-sales in big box stores, they will target the store employee who doesn’t have 2-factor authentication enabled on his or her smart phone. The key for corporate IT is to manage and minimize the risks as much as possible.

Subscribe for Updates

John Lawler, Director of Cloud Professional Services

John oversees all deployments of Google Workspace and Chrome and post-deployment services that help customers see the value in the entire Google platform. He has been helping organizations go Google since 2009.

Popular posts

AWS 101: What is Amazon S3 and Why Should I Use It?

Kubernetes 101: What are Nodes and Clusters?

Google Workspace vs. Microsoft 365: A Comparison Guide (2022)