No matter individual or enterprise, there are information stored in the cloud.

The pre-requisite to use cloud is the communication line from your end point to the hosting location.

Most rely the as-built cyber protections like TLS, 2-step authentication offered by the provider. No doubt, these are deemed secure.

But if your information is of high value, you need to consider the appropriate level of extra layers, e.g. single tenancy, dedicated hosting location with physical access control,  further end-to-end communication encryption, database level encryption or tokenization, periodic security assessment, regular situation awareness to keep your people from being victim of spear phishing attack.

All these don’t mean 100% security but to demonstrate your due diligence to secure your data.

Leave a Reply