As a result, growing amounts of sensitive customer (and company) data is stored on the cloud, and there is evidence to suggest that many organisations are still struggling to secure their clouds. Six months into 2018, some spectacular breaches had occurred, with the most significant being the personal information of all 1.1 billion citizens registered in India. Locally, the most significant case has probably been the breach at Liberty Holdings in January. Such breaches are increasingly common.
A complicating factor is that businesses often operate across more than one cloud, such as AWS and Azure, each having differing security protocols to grapple with.
Worse, many appear to be reluctant to even address the issue at hand. The 2018 Global Cloud Data Security Study, conducted by the Ponemon Institute on behalf of Gemalto, shows that a third of respondents (34 percent) believe that it’s the customer’s responsibility to secure their data in the cloud, whereas two thirds (62 percent) of customers actually hold businesses responsible. With less than half (46 percent) of businesses clearly defining roles and accountability for securing confidential or sensitive information in the cloud, it’s clear many are struggling to get their houses in order.
Taking responsibility for cloud security
In a growing number of countries, the legal responsibility for safeguarding customer data, no matter where it is housed, is unambiguously allocated to the company or organisation. The General Data Protection Regulation (GDPR) in the European Union and the Protection of Personal Information (PoPI) Act in South Africa are just two examples of this growing international trend. Organisations, and ultimately their boards, found to be taking insufficient steps to secure the data will be subject to fines and legal repercussions.
So, what can organisations do to avoid falling foul of both regulators and customers?
The key ingredient is leadership. While cloud services themselves are generally secure, the task of configuring and using them securely is often left to organisation’s IT leaders, development teams, or even business line managers. However, confusion surrounding who should implement cloud security has created challenges. Organisations must now take full ownership of the security within their clouds. A figure, such as a CISO, must be appointed to the board of a business to educate other C-level executives on the importance of data security and take responsibility for the data in the event of a breach. This ensures the business has buy-in from the board, can communicate a cloud security strategy widely, and educate staff about good cyber hygiene, thus minimising internal risks.
Once a central figure has been appointed to the board, he or she must set about ensuring that the cloud is protected. Below are five steps to help with this.
Five steps to cloud security
- Understand where the data is
Before implementing any cybersecurity strategy, businesses must first conduct a data audit. This helps them understand what data they have collected or produced and where the most sensitive and valuable parts sit. If businesses don’t know what data they possess and produce, they can’t even begin to start protecting it.
2. All sensitive data must be encrypted
While it’s crucial that businesses restrict who can access sensitive data, it’s encryption that protects data in the event of a breach. Regardless of where data is – on their own servers, in a public cloud, or a hybrid environment – encryption must always be used to protect it.
3. Securely store keys
When data is encrypted, an encryption key is created to unlock and access encrypted data. Consequently, businesses must ensure that these keys are securely stored away from the cloud. Storing a physical key offsite helps ensure it can’t be linked to any encrypted data in the cloud.
4. Introduce two-factor authentication
Next, businesses should adopt strong two-factor authentication, to ensure only authorised employees have access to the data they need to use. Two-factor authentication involves using something authorised individuals possesses, such as a smartphone that can receive a message, and something they know, like a password. This is more secure than relying on passwords alone, which can be easily hacked.
- Always install latest patches
As bugs and vulnerabilities emerge, hardware and software vendors constantly issue patches. However, many businesses don’t install patches quickly enough or use software which no longer receives regular patches. Figures from Net Applications show that one in 10 organisations still use Windows XP, despite patches being discontinued. It is imperative that businesses install patches as they become available, to avoid becoming easy targets for hackers.
- Evaluate and repeat
Once a business has implemented the above steps, it’s crucial that each step is repeated for all new data that enters its system. Cybersecurity and legal compliance are a continuing process, not an event. These steps will ultimately help make businesses unattractive or unviable targets for attackers as even in the event of a breach they won’t be able to use, steal or hold their data for ransom.
With businesses now footing the bill, reputationally and financially, for any data breach, it’s never been more important for them to take full ownership of the data they hold.
Notre Dame, Scoop Makhathini, GoT, top week in search
From fire disaster to social media disaster, the top Google searches this week covered a wide gamut of themes.
Paris and the whole world looked on in shock as the 856-year-old medieval Catholic cathedral crumbled into ash. The tragic infernal destruction of this tourist attraction of historical and religious significance led South Africans to generate more than 200 000 search queries for “Notre Dame Cathedral” on Monday. Authorities are investigating the cause of the fire that razed the architectural icon.
In other top trending searches on Google this week, radio presenter Siyabonga Ngwekazi, AKA Scoop Makhathini, went viral when it appeared he had taken to Twitter to expose his girlfriend, Akhona Carpede, for cheating on him. Scoop has since come out to say that he was not responsible for the bitter rant and that his account was hacked. “Scoop Makhathini” generated more than 20 000 search queries on Wednesday.
Fans generated more than 20 000 search queries for “Sam Smith” on Tuesday ahead of the the British superstar’s Cape Town performance at the Grand West Casino. Smith ended up cutting his performance short that night due to vocal strain.
Local Game of Thrones superfans were beside themselves on Sunday, searching the internet high and low for the first episode of the American fantasy drama’s eighth season. “Game of Thrones, season 8, episode 1” generated more than 100 000 queries on Google Search on the weekend.
As the festivities kicked off in California with headliners such as Childish Gambino and Ariana Grande, South Africans generated more than 2 000 search queries for “Coachella” on Saturday.
South Africans generated more than 5 000 search queries for “Wendy Williams” on Friday as it emerged that the American talk show host had filed for divorce from her husband Kevin Hunter after 21 years of marriage. Hunter has long been rumored to have been cheating on Williams, which reportedly finally led to the divorce.
Search trends information is gleaned from data collated by Google based on what South Africans have been searching for and asking Google. Google processes more than 40 000 search queries every second. This translates to more than a billion searches per day and 1.2 trillion searches per year worldwide. Live Google search trends data is available at https://www.google.co.za/trends/hottrends#pn=p40
5G smartphones to hit 5M sales in 2019
According to the latest research from Strategy Analytics, global smartphone shipments will reach a modest 5 million units in 2019. Early 5G smartphone models will be expensive and available in limited volumes. Samsung, LG and Huawei will be the early 5G smartphone leaders this year, followed by Apple next year.
Ken Hyers, Director at Strategy Analytics, said, “We forecast global 5G smartphone shipments will reach a modest 5 million units in 2019. Less than 1 percent of all smartphones shipped worldwide will be 5G-enabled this year. Global 5G smartphone shipments are tiny for now, due to expensive device pricing, component bottlenecks, and restricted availability of active 5G networks.”
Ville Petteri-Ukonaho, senior analyst at Strategy Analytics, added, “Samsung will be the early 5G smartphone leader in the first half of 2019, due to initial launches across South Korea and the United States. We predict LG, Huawei, Xiaomi, Motorola and others will follow later in the year, followed by Apple iPhone with its first 5G model during the second half of 2020. The iPhone looks set to be at least a year behind Samsung in the 5G smartphone race and Apple must be careful not to fall too far behind.”
Neil Mawston, executive director at Strategy Analytics, added, “The short-term outlook for 5G smartphones is weak, but the long-term opportunity remains huge. We forecast 1 billion 5G smartphones to ship worldwide per year by 2025. The introduction of 5G networks, by carriers like Verizon or China Mobile, opens up high-speed, ultra-low-latency services such as 8K video, streaming games, and augmented reality for business. The next big question for the mobile industry is how much extra consumers are really willing to pay, if anything, for those emerging 5G smartphones and services.”
Strategy Analytics provides a snapshot analyses for the outlook for 5G smartphone market in this Insight report: 5G Smartphones : From Zero to a Billion
Strategy Analytics provides a deep-dive into the air-interface technologies that will power phones through 2024 across 88 countries here: Global Handset Sales Forecast by 88 Countries and 19 Technologies : 2003 to 2024