Context:
A 2023 survey by Thales Cloud Security revealed that in India, 68% of businesses consider more than 40% of their cloud-stored data as sensitive.
- Additionally, 35% of Indian organizations reported data breaches in the cloud environment last year.
About Cloud Storage:
- Cloud storage is a method of storing digital data on off-site servers.
- Need for Cloud Storage:
- Companies use it to avoid the costs and maintenance of operating their own data centers.
- Cloud storage offers scalability and security features such as physical security, encryption, and access management.
Challenges Associated with Cloud Storage:
- Incompatible systems: Deploying legacy IT systems that are not compatible with cloud storage can pose challenges in data integration and security.
- Third-party architecture: Relying on third-party providers for data storage introduces risks if their architecture or security measures are not up to standards.
- Weak authentication: The use of weak authentication practices and easily guessable passwords can lead to unauthorised access to sensitive data.
- Insecure APIs: Vulnerabilities in Application Programming Interfaces (APIs) used for accessing and managing cloud storage can expose data to unauthorised access or manipulation.
- Inadequate security controls: Poorly designed or inadequate security controls can leave data vulnerable to breaches or unauthorised access.
- Internal threats: Human error within an organisation can result in accidental exposure or mishandling of data stored in the cloud.
Way Forward:
- Change passwords: In response to data breaches, users are advised to change their passwords. This helps protect their accounts from unauthorised access.
- Enable two-factor authentication (2FA): Setting up 2FA adds an extra layer of security by requiring a secondary form of verification, reducing the risk of unauthorised access.
- Monitor accounts: Users should regularly monitor their accounts for any suspicious activity or unauthorised transactions. This helps identify potential security breaches or fraudulent actions.
- Be cautious of suspicious activity: Users should be vigilant and watch out for any suspicious SMS messages or emails that may indicate phishing scams or unauthorised access attempts.
News Source: The Hindu
To get PDF version, Please click on "Print PDF" button.