• Latest
  • Trending
Combating Cyber-Threats in the Age of Big Tech

Combating Cyber-Threats in the Age of Big Tech

November 25, 2021
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Wednesday, 8 February, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Combating Cyber-Threats in the Age of Big Tech

by ITECHNEWS
November 25, 2021
in Opinion
0 0
0
Combating Cyber-Threats in the Age of Big Tech

The report concerning Microsoft Azure’s Cosmos DB database should be an IT security wake-up call to the tech giants and other organizations, especially those moving more and more toward cloud services. In addition, as office reopenings are being halted due to the ongoing pandemic, more and more emphasis must be placed on keeping organizations secure, especially while their employees continue to work remotely.

Human Error Remains Cybersecurity’s Biggest Obstacle

Microsoft products and services are designed, managed and maintained by people — just like any other IT service. And people make mistakes, especially in the highly complex world of IT security. This is the reason why all organizations must not assume that the IT security measures they’ve established are 100% guaranteed to keep cybercriminals out. 

YOU MAY ALSO LIKE

Making Biometrics Work: 3 Ways To Jumpstart the Process

How to prevent cyberbullying: Keeping students safe

There are very clever, crafty people out there who spend many hours working out ways to attack corporate networks in ways that no one else considered. The ‘good guys,’ or ethical hackers, do this for a living with rewards such as ‘bug bounties’ that big tech companies payout for information about security flaws. But there are many more ‘bad guys’ than good guys out there, and the rewards are often much more significant while the chances of getting caught remain very slim.

IT Security Is Paramount

Big tech must continue to invest heavily in IT security. This is just a commercial decision since even the best IT services will lose more and more business if security breaches keep occurring. The combination of highly effective news dissemination together with cybercriminals who use publicity in various forms to put pressure on organizations means that hushing up IT security incidents is definitely the wrong thing to do.

All Parties Must Defend Their Data

It’s not just the big tech organizations that are on the hook for IT security. Since not even they can prevent all cyber-attacks and breaches, their customers must share some of the responsibility for keeping their data and systems secure. 

Many cloud services provide shared security models, but these should also be carefully examined. Even though there is shared responsibility, the cloud provider is still the single entity managing the security measures. And a single entity is a single weak point, prone to cyber-attacks. 

Organizations Need to Have Some Control 

In the Microsoft Cosmos DB case, the customer generates the security keys managed and stored within the Microsoft service. The discovery that this was not protected meant that this ‘shared’ security model still failed at the single point of control.

Organizations must therefore take at least some control over IT security, using tools over which they have control rather than a single external supplier. The ‘endpoint’ is perhaps the most obvious example here. Most organizations that embrace cloud services continue to provide their staff with PCs — and this is the endpoint.

Endpoint Security Is Vital

Many organizations may have well examined the security controls provided by the cloud service but often dismiss the endpoint. However, in many cases, the end-user will save a variety of data locally onto their PC. This is frequently data downloaded from the cloud service for reporting, analysis or just as a more convenient way of processing information — ultimately, not all cloud services allow users to do things exactly the way they find most efficient. It is therefore essential to ensure that endpoints are just as well protected as servers and services.

The bottom line: Big tech must continue to work hard at IT security, using their own in-house expertise and benefiting from third-party security experts who can provide a fresh pair of eyes. In addition, they should encourage their customers to use the built-in shared security functions and use their own IT security tools so that there is no single weak point.

Nigel Thorpe Technical Director, SecureAge | infosecurity magazine

ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version