Page 5 - index
P. 5







The four easy steps to protecting cloud data

David Miles, Information Security Manager at Six Degrees Group, gives the following advice to
organisations looking to communicate the data security risks in the cloud space:

We think an ongoing and fluid approach is best, as cloud technology is in constant flux.
Ultimately however it’s implicit that our employees have a firm understanding of our cloud model
because, after all, it’s our model! Our priority is ensuring our team can answer any incoming
queries and communicate to our customers any factors that may present a risk to their
organisation.

For this reason, we run training programs for new staff to bring them up to scratch with our
cloud model, and maintain their awareness by discussing any issues as they arise. If an issue
becomes prominent in the media, for example, we will send internal communication explaining it
and giving a relatable description of any risks that may present themselves to our staff.

We would recommend that companies follow a similarly ongoing approach for their staff to
prevent any mistakes from happening. They may find our approach helpful:
1. A robust and dynamic induction program for staff, including a range of examples of cloud
security risks and explanations on how to prevent these
2. Regular awareness sessions to highlight any new issues that may present a risk to the
organisation’s cloud security
3. An open policy of internal communication so that employees can comfortably ask
questions that may arise around these topics
4. Utilisation of file access control measures that allow for segregation of data and staff
roles and responsibilities within the organisation that prevents unauthorised manipulation
of information


About the Author:

David Miles is the Information Security Manager at Six Degrees Group,
a converged technology solutions provider. He has an excellent
knowledge base in many security and intelligence disciplines
developed during a career spanning the military, commercial and
government environment.’














5 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   1   2   3   4   5   6   7   8   9   10