Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Danger in the cloud

5 major cloud-based security risks and how to safeguard against them

September 16, 2019

Danger in the cloud
According to a recent study, the market for cloud security products and services will increase at a compound annual growth rate of 13.9% through 2024. This rapid growth isn’t surprising since 9 out of 10 cybersecurity professionals consider cloud security to be a top priority.

Here are some of the issues the experts are most concerned about—and your data center customers should be concerned about, too:

  1. Data breaches and the loss or theft of proprietary information—This is the risk that’s first and foremost on all business executives’ minds. Approximately 21% of all files uploaded to cloud-based file sharing services contain information that’s not meant for public release. Whether it’s the result of a target attack, human error, application vulnerability or lax security practices, a data breach can be catastrophic to a company’s reputation and bottom line. Data loss isn't always the result of cybercrime. It can also occur if a fire, earthquake or other natural disaster interrupts or damages a cloud service provider’s infrastructure.
     
  2. Account hijacking—If attackers get a hold of users’ credentials, they can gain access to critical cloud computing services—and have the ability to compromise those services’ confidentiality, integrity and availability.
     
  3. Insecure interfaces and application programming interfaces (APIs)—The provisioning, monitoring and management of cloud services are all done through software user interfaces or APIs. If they’re compromised, this can seriously impact cloud performance.
     
  4. Advanced persistent threats (APTs)—These parasitical cyberattacks infiltrate
    the IT infrastructures of targeted companies and do damage over time, often adapting to the security measures put in place to defend against them.
     
  5. Denial of Service (DOS)—DOS attacks prevent users from accessing their data or applications. By forcing a cloud service to use inordinate amounts of processing, power memory, disk space and/or network bandwidth, DOS attackers can cause serious slowdowns.
Steps data centers can take to minimize these risks
  • Design and implement a comprehensive security architecture that addresses the following:

    • Stringent identity and access management
    • Data protection and encryption
    • Data recovery and loss prevention
    • Data classification tagging
    • Security monitoring
  • Extend on-premise security operations into the cloud 
  • Conduct ongoing security awareness training for all company employees
  • Automate security tasks, including such critical functions as vulnerability threat management, vulnerability patch management, incident response, and security metrics generation and reporting
Your data center customers will no doubt look to you for guidance on how to implement the above safeguards. If you need support to help them, contact one of the security experts at Ingram Micro.