Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Why you can’t ignore cloud security

Over the past few years, enterprises across Australia have moved more and more of their systems and applications to the cloud, with the trend only gathering pace with people increasingly working outside the traditional network perimeter, often at home and other locations. 

Throughout 2022, several large enterprises, including NAB, doubled-down on their cloud migration plans, while the vast majority of the CIO50 listed this among their top priorities.  

But while the cloud provides more flexible and scalable IT services, it’s also introducing new and vexing challenges around cyber security. In particular, many organisations are having to make significant cultural – in addition to technical – adjustments to deal with the fact that growing caches of potentially sensitive credentials are in the hands of more people.

The recent attacks on NFPs would seem to highlight many of the security risks being posed by the migration to the cloud. Typically fiscally restrained, their migrations are often more hurried and less considered, while they also tend to have fewer resources to train staff, many of whom are part time or volunteers.

Our attendees reflected on the serious concerns raised about security since the earliest days of the cloud; concerns that were often dismissed as unfounded, and centred mainly around issues of data sovereignty.

But the security challenges apparent in the cloud today are quite different to what was imagined in the past.

There are several key questions organisations need to ask themselves today as part of their plans to ensure they’re assuming a robust cyber security posture as the cloud becomes increasingly ubiquitous.

  • Have your intrusion detection and prevention strategies have changed as you move systems and applications off your on-premise facilities and into the cloud?
  • What recent high profile cyber-attacks in Australia are teaching you about your own cyber security posture and why data security can never be an afterthought?
  • How you are ensuring your data and applications can be accessed securely no matter where users are located?
  • Why it’s vital to make sure your technology teams don’t lose focus on cyber security in a cloud environment with fast moving cloud-native development processes?
  • Do you feel that the pressure to migrate to the cloud and take advantage of the usability and cost benefits, is exposing you to cyber security risks?
  • Do you, or are you seeking to have security baked into your cloud provider SLAs? Do these take account of changing security risks in the event of activities being dramatically scaled up?
  • Are you confident you’ll be able to contact the key people at your provider in the event of a breach? Have their staff been vetted?
  • Have you ensured your provider doesn’t have your key access passwords?
  • Has the criticality of your data been fully ascertained?

George Dragatsis, A/NZ chief technology officer with Hitachi Vantara Australia says it’s essential that CISOs, CIOs and others tech leaders contemplate these questions seriously.

“Ultimately, whatever you did with respect to security on premise won’t help you in the cloud”.

He explains that there are two phases to getting security right in today’s virtual, SaaS-based environment.

The first is the ‘front end’, with an emphasis on endpoint protection, identifying external threat factors and developing strategies to mitigate against them. And the second is all about guaranteeing 100 percent data availability, as well as high levels of resilience, for instance in the face of a ransomware attack, to ensure a quick and effective recovery.

“Organisations need to ensure they’re able to get back up and running in the unfortunate event of an attack. And they need to guarantee the ‘immutability’ of corporate business data,” Dragatsis adds.

But according to Nathan Knight, managing director of Hitachi Vantara A/NZ, while most tech leaders understand the importance of  getting back up and running as soon as possible after a breach, many businesses lack a clear picture of what’s actually occurred and the implications.

“Visibility into the impacts of breaches appears to be poor, with Medibank, for instance, still unable to tell customers what data has been lost”.

The Medibank breach of November 2022, has been described as arguably the biggest in Australian corporate history, with more than 200 gigabytes of sensitive health data from almost 4 million Australians being ransomed under threat of publication on the Dark Web.

It’s now widely accepted that the breach followed a simple theft of key credentials from an unwitting staff member; a situation that is becoming more common because of companies’ increased reliance on the cloud.

And while every cyber breach seems to trigger vigorous finger pointing, especially from the media, Knight stresses that cyber security is far from a perfect science, with the cloud making it even less so.

“Maybe we all need to accept that you can’t keep everyone out, and that it’s critical to  focus on getting back up and running as quickly as possible”.

Darren Reid, director of VMWare’s security business explains that the nature of cloud computing demands an approach to security that is “intrinsic”. “Security must be built-in, rather than bolted-on”.

He adds that as we’ve modernised apps and moved to the cloud at speed, many organisations seem to have lost sight of the “controls that we used to have”.

“We’re accessing data via unsecured networks and all of that structure we used to have around us is basically gone”.

When trying to secure networks today, it’s critical therefore to know the first point of entry. Figuring this out requires micro-segmentation and the correlation of end-point data.

“You can limit to laptops, or segment networks. That’s ok,” Reid says. “But if an attacker is inside your apps, data is being exfiltrated and you’re about to be ransomed”.

Increasingly, tech and business leaders are being urged to work more closely together on cyber security these days, with the move to the cloud playing no small part in ramming home the message that everyone has their part to play.

“Security is not just a problem for security people anymore,” stresses Reid. “It’s team sport for everyone in the company.”

Meanwhile, as several of our delegates noted, not only are cyber attackers becoming more sophisticated and organised, we’re now entering a new phase whereby they’re operating more like entrepreneurs, taking more serious note of things like ROI, profit and loss, arguable strengthening their resolve to ‘get results’.

However, Reid notes that despite the heightened risks, this there is a definite lack of skills more broadly across organisations, meaning CISOs, CIOs and other tech professionals with responsibility for cyber are “getting slammed”.

Moving forward, all attendees agreed that it’s imperative cyber security is elevated in all discussions across organisations, starting with ensuring that everyone understands what a phishing email is.

Business teams needs to be up to speed and vigilant. And when problems are reported, there needs to be a proper understanding of the context.

Further reiterating the importance of ensuring rapid recovery, Reid adds that nothing should be taken for granted when it comes to backups either.

“While people might say, oh we’ve got a backup, the question needs to be asked, “are those backups ‘immutable’”?.

Cloud Management, Cloud Security


Read More from This Article: Why you can’t ignore cloud security
Source: News

Category: NewsFebruary 23, 2023
Tags: art

Post navigation

PreviousPrevious post:Debunking conventional wisdom: increased security improves performance and customer experienceNextNext post:How to Build ROI from Cloud Migration

Related posts

HUAWEI eKit strives to simplify AI adoption for SMBs
March 6, 2026
One title, many realities: How the CIO role changes by organization size and industry
March 6, 2026
What the COBOL Translation Backlash Gets Right — and Wrong
March 6, 2026
Technical debt is the tax killing AI ambition
March 6, 2026
BMW lleva robots humanoides con IA a su fábrica de Leipzig
March 6, 2026
Why great IT teams ‘just work’ (and most don’t)
March 6, 2026
Recent Posts
  • HUAWEI eKit strives to simplify AI adoption for SMBs
  • One title, many realities: How the CIO role changes by organization size and industry
  • What the COBOL Translation Backlash Gets Right — and Wrong
  • Technical debt is the tax killing AI ambition
  • BMW lleva robots humanoides con IA a su fábrica de Leipzig
Recent Comments
    Archives
    • March 2026
    • February 2026
    • January 2026
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.