Call us now Email a specialist
+353 1 6420100 | info@ward.ie
  • Resources
  • Blogs
  • #AboutYourCloud: Intune your plan!

    By Vincent Naughton on May 3, 2019

    We started the #AboutYourCloud series that show real-life scenarios that can happen in any business and what impact it has in your cloud. This can be the simplest human error one can make that can lead to a vulnerability within the environment. For eg; Have you lost a company device like a phone/tablet/laptop? Or, when...

    • #AboutYourCloud: Intune your plan!

      We started the #AboutYourCloud series that show real-life scenarios that can happen in any business and what impact it has in your cloud.

      This can be the simplest human error one can make that can lead to a vulnerability within the environment. For eg; Have you lost a company device like a phone/tablet/laptop? Or, when someone leaves the organisation, what are the necessary precautions your company is taking on their exit strategy?

      The fact is that many companies are moving to a digitally transformed world and with this transformation comes a lot more risks. The good news is, these risks can be avoided if the right practices are in place.

      Here are some cloud security stats to pay close attention to:

      Insider threats are the most common kind of attacks, 93% of businesses suffer from at least one of these every month. These attacks are either malicious or negligent behaviour by the employee.

      According to Gartner They say by 2022, 95% of cloud failures are predicted to be the customer’s fault. A business should follow a life cycle approach to cloud security from placing a central management and monitoring any kind of activity in the cloud environment.

      Let’s take the examples shown in our latest video;

       

      Theft:

      The CEO of the company has been robbed and everything including his work devices have been taken away from him. He immediately reports this to the IT department and with the help of EMM solutions they can perform a remote data wipe on the device and no one has access to any information in the device after that. Watch our last video to see a demo of how this works.

      Exit Strategy:

      An employee is planning to leave the company but he is not leaving on the best note. He might be able to send over some sensitive information to himself when he joins another company. With the help of MAM this transfer can be restricted. We’ve created a demo for this kind of scenario in our last video, have a look.

      According to a McAfee study, an employee actively uses 36 cloud services at work. This includes 9 collaborations, 6 file-sharing and 5 content-sharing services. A business cannot stop this kind of usage from employees but they can definitely study and control the activity before it turns into a threat to the organisation.

      The series is to show you real-life scenarios on how your cloud can be impacted in the most common ways possible. These cases occur in any business and here are ways to recover from any threats caused by them.

      Watch our last video in this series to show you how to avoid a phishing scam- click here

      We do not want to preach about security but we want every individual in an organisation to practice it. If you would like to speak to our subject matter experts for further advice, call us: 1800 903 552 or e-mail us.

       

    • Latest Blogs