Cloud Storage

Context: 

A 2023 survey by Thales Cloud Security revealed that in India, 68% of businesses consider more than 40% of their cloud-stored data as sensitive. 

  • Additionally, 35% of Indian organizations reported data breaches in the cloud environment last year.

About Cloud Storage:

  • Cloud storage is a method of storing digital data on off-site servers. 
  • Need for Cloud Storage:
    • Companies use it to avoid the costs and maintenance of operating their own data centers. 
    • Cloud storage offers scalability and security features such as physical security, encryption, and access management.

Challenges Associated with Cloud Storage:

  • Incompatible systems: Deploying legacy IT systems that are not compatible with cloud storage can pose challenges in data integration and security.
  • Third-party architecture: Relying on third-party providers for data storage introduces risks if their architecture or security measures are not up to standards.
  • Weak authentication: The use of weak authentication practices and easily guessable passwords can lead to unauthorised access to sensitive data.
  • Insecure APIs: Vulnerabilities in Application Programming Interfaces (APIs) used for accessing and managing cloud storage can expose data to unauthorised access or manipulation.
  • Inadequate security controls: Poorly designed or inadequate security controls can leave data vulnerable to breaches or unauthorised access.
  • Internal threats: Human error within an organisation can result in accidental exposure or mishandling of data stored in the cloud.

Way Forward: 

  • Change passwords: In response to data breaches, users are advised to change their passwords. This helps protect their accounts from unauthorised access.
  • Enable two-factor authentication (2FA): Setting up 2FA adds an extra layer of security by requiring a secondary form of verification, reducing the risk of unauthorised access.
  • Monitor accounts: Users should regularly monitor their accounts for any suspicious activity or unauthorised transactions. This helps identify potential security breaches or fraudulent actions.
  • Be cautious of suspicious activity: Users should be vigilant and watch out for any suspicious SMS messages or emails that may indicate phishing scams or unauthorised access attempts.

News Source: The Hindu

To get PDF version, Please click on "Print PDF" button.

Need help preparing for UPSC or State PSCs?

Connect with our experts to get free counselling & start preparing

THE MOST
LEARNING PLATFORM

Learn From India's Best Faculty

      
Quick Revise Now !
AVAILABLE FOR DOWNLOAD SOON
UDAAN PRELIMS WALLAH
Comprehensive coverage with a concise format
Integration of PYQ within the booklet
Designed as per recent trends of Prelims questions
हिंदी में भी उपलब्ध
Quick Revise Now !
UDAAN PRELIMS WALLAH
Comprehensive coverage with a concise format
Integration of PYQ within the booklet
Designed as per recent trends of Prelims questions
हिंदी में भी उपलब्ध

<div class="new-fform">







    </div>

    Subscribe our Newsletter
    Sign up now for our exclusive newsletter and be the first to know about our latest Initiatives, Quality Content, and much more.
    *Promise! We won't spam you.
    Yes! I want to Subscribe.