Cloud Security: This Knowledge And Skills Are in Demand

The growth rate in the cloud computing market has reached a considerable speed in recent years. According to a study by IDC, global public cloud service spending is expected to increase 19.4 percent annually by 2019, six times more than spending on the IT sector as a whole.

More and more companies are switching to the cloud. This also increases the demand for IT professionals with the skills to make the most of technology.

The rapid increase in the cloud computing market has long caused a shortage of skilled workers. Especially cloud security experts are being sought after more than ever: Information security is still the biggest concern of companies implementing cloud technologies, according to a study by BT.

<a href="https://lear

Advertisements

The growth rate in the cloud computing market has reached a considerable speed in recent years. According to a study by IDC, global public cloud service spending is expected to increase 19.4 percent annually by 2019, six times more than spending on the IT sector as a whole.

More and more companies are switching to the cloud. This also increases the demand for IT professionals with the skills to make the most of technology.

The rapid increase in the cloud computing market has long caused a shortage of skilled workers. Especially cloud security experts are being sought after more than ever: Information security is still the biggest concern of companies implementing cloud technologies, according to a study by BT.

Cloud security experts require specific, well-developed skills. We’ve put together the five most important and most requested Cloud Security Skills for you.

Compliance

As soon as a company decides to use a cloud storage or backup service, compliance becomes an important issue. The transfer of data from internal to external storage makes it necessary to ensure high data security and to ensure compliance with laws and industry regulations. In particular, with regard to the EU data protection regulation, companies need to take action soon to comply with the new regulation.

An understanding of the types of data that can be moved to the cloud or not, the careful study of potential vendors, and the use of correct terminology in service-level agreements (SLAs) – all these are imperative areas of enterprise cloud compliance. Neglecting cloud compliance can cost an organization millions. In addition to imposed financial penalties, considerable damage to the reputation threatens.

Ethical hacking

More and more popular is the so-called ethical hacking. Businesses are increasingly looking for ethical hackers and penetration testers to assess the security of private, public, and hybrid cloud environments.

Ethical hackers combine various tools, hacking and penetration techniques to uncover weaknesses in enterprise systems. Thus, security holes can be closed even before attackers detect them – damage from cyber attacks are thus prevented from the outset. The best-known qualification in this field is the Certified Ethical Hacker Certification, which includes modules on cloud computing.

Migration and platform knowledge

Platform-specific capabilities are particularly important for migration and subsequent security. Cloud experts help companies choose the right platform and understand the vendor-specific security implementation. This requires, for example, knowledge of which provider guarantees the physical security of the infrastructure and which built-in security features the platform provides.

Migration and data transfer abilities are the prerequisites for ensuring sufficient data security when moving to the cloud. In-depth knowledge of the respective cloud platform should definitely be available. For leading vendors, such as Amazon Web Services and Microsoft Azure, there are official cloud certifications for professionals to gain platform-specific knowledge.

Communication

Surprisingly, communication is one of the most important cloud security skills, completely independent of the technologies used. Cloud Security includes some complex technical concepts and terms that require explanation. The ability to communicate these intelligibly to management and non-technical personnel is critical to the correct implementation of cloud security in the enterprise.

In the ISC Global Information Security Workforce Study, 90 percent of the 14,000 respondents rank “communication” as # 1 of the most important skills for a successful information security expert.

Encoding

The hacker attack on the British provider TalkTalk last year cost the company 60 million pounds. The cause – Hackers intercepted unencrypted data packets and thus obtained personal customer information and bank data.

Secure encryption is and remains one of the most effective ways to protect sensitive data. With the enormous amount of data being transferred between the enterprise and the cloud, the development of complex encryption algorithms and the use of existing cloud encryption services are among the most valuable skills of a cloud security expert.

Report on Global Financial Threats Against Banks or Institutions

Symantec says financial threats are 2.5 times more relevant than ransomware, with more than 1.2 million detections per year worldwide.

Attention to ransomware-type attacks is on the rise. However, Symantec presented its annual report on financial threats in which financial malware is identified as more relevant than ransomware.

Main findings

Financial threats are more relevant than ransomware

While this second type of threat continues to have all the attention (especially in the recent case of WannaCry ransomware), financial threats are 2.5 times more relevant, with more than 1.2 million detections in the world.

Attacks on rising financial institutions

Since 2016, with the emergence of several sophisticated cybercrime groups following

Symantec says financial threats are 2.5 times more relevant than ransomware, with more than 1.2 million detections per year worldwide.

Attention to ransomware-type attacks is on the rise. However, Symantec presented its annual report on financial threats in which financial malware is identified as more relevant than ransomware.

Main findings

Financial threats are more relevant than ransomware

While this second type of threat continues to have all the attention (especially in the recent case of WannaCry ransomware), financial threats are 2.5 times more relevant, with more than 1.2 million detections in the world.

Attacks on rising financial institutions

Since 2016, with the emergence of several sophisticated cybercrime groups following financial institutions, 38% of all detections of financial threats were directed to institutions rather than attacking consumers. This is because the benefit to cyber criminals is much greater.

Symantec saw a large increase in the detection of financial Trojans throughout Asia, with Japan, China, India, the Philippines and Vietnam gaining prominence in the top 10 list. This shows that the attackers are expanding into new markets of less saturated and less protected regions.

United Kingdom: Companies Are Stacking More and More Bitcoins

British companies are prepared to pay up to £136,000 on average to recover critical data taken hostage by ransomware. This is the outcome of the 2017 survey sponsored by Citrix UK, a company that provides collaborative, virtualization and networking products to facilitate mobile work and adoption of cloud services.

The survey covered 500 British companies with a minimum workforce of 250 employees. It follows a precedent launched by the same company a year ago. The average amount of the ransom payment was then £29,544. With the £136,000 pledged this year, there was an increase of 361 percent.

It should be made clear that these companies are complying with one of the major requirements of the authors of ransomware: receiving payments in bitcoins.

The 2017 survey shows that co

British companies are prepared to pay up to £136,000 on average to recover critical data taken hostage by ransomware. This is the outcome of the 2017 survey sponsored by Citrix UK, a company that provides collaborative, virtualization and networking products to facilitate mobile work and adoption of cloud services.

The survey covered 500 British companies with a minimum workforce of 250 employees. It follows a precedent launched by the same company a year ago. The average amount of the ransom payment was then £29,544. With the £136,000 pledged this year, there was an increase of 361 percent.

It should be made clear that these companies are complying with one of the major requirements of the authors of ransomware: receiving payments in bitcoins.

The 2017 survey shows that companies with more than 1,000 employees store an average of 23 BTCs in order to be able to mitigate any eventuality as soon as possible. Approximately 28% of these would store more than 30 BTC, the equivalent of £50,000, ready to satisfy any hacker requirements.

The 2017 survey also shows that the number of businesses with 250 to 500 employees who adhere to such practices increased by 14% compared to 2016. At the same time, The proportion of businesses with 250 to 500 employees who maintain funds in Bitcoins ready to be transferred to hackers is always greater than that of companies with more than 1,000 employees who also store bitcoins.

Taking into account that this poll initiated by Citrix last year already revealed that British companies were storing bitcoins to satisfy any hacker demands. It should not be surprised to review these figures upwards next year when we know that the ransomware WannaCry first hit the British.

But is the approach of setting aside funds to satisfy hackers the right one? The answer is no since the payment does not guarantee the restoration of the data. Rather, these funds could be used to implement better security policies.

Having Your Business Data in the Cloud is Not Only Safer But More Cost-Effective

The methods for a company to migrate their systems to the cloud are different and varied. However, the most important thing to keep in mind is that there are a number of myths for those who have to make the decision on cloud migration.

One of the main myths about migrating business data to the cloud lies in the concern about the potential vulnerability of its confidentiality. The trend is changing because before people wanted to have the information saved, but now they realize that the cloud is safe and once there the data is there, it is harder to lose.

Advances in technology have made possible attacks to violate or hack the information are minimized. In addition to demystifying the security issue, the main advantage of having information from a company in the cloud is portability.

By having the data in the cloud, they are available at any time

The methods for a company to migrate their systems to the cloud are different and varied. However, the most important thing to keep in mind is that there are a number of myths for those who have to make the decision on cloud migration.

One of the main myths about migrating business data to the cloud lies in the concern about the potential vulnerability of its confidentiality. The trend is changing because before people wanted to have the information saved, but now they realize that the cloud is safe and once there the data is there, it is harder to lose.

Advances in technology have made possible attacks to violate or hack the information are minimized. In addition to demystifying the security issue, the main advantage of having information from a company in the cloud is portability.

By having the data in the cloud, they are available at any time, and for all members of the company who are duly authorized, otherwise, companies usually use programs that involve more complex procedures to access.

The company will not have to dedicate itself to buying servers nor will it need specialized technical support people. The only thing that will require is the internet connection to access the data of the organization that will be in the cloud.

Software providers have agreements with companies that provide the service of putting information in the cloud, such as Microsoft, Dropbox, Orange Cloud, and Box, among others. What matters is the advice of experts to choose the provider that most closely matches the needs of each company.

There are different providers of this service, in the hosting part or those that distribute this type of technology, are classified according to their qualification. If the customer is looking for a company with low qualification, it will have less available their data. And now companies are migrating to the cloud for security and improving their processes.