Intelligent CISO Issue 31 | Page 65

Businesses did not implement best-practice cybersecurity measures before we all set up our home offices and started working completely from home .
BUSINESS SURVEILLANCE
in order to let the community find unintended vulnerabilities ? Does the provider perform annual due diligence checks to ensure their existing technology stack has not become stale with lagging technology ?
The biggest players in the cloud space like Google , Amazon and Microsoft have the best security teams and tools available , but this doesn ’ t mean your organisation doesn ’ t still play a major role in the security of your data .

Businesses did not implement best-practice cybersecurity measures before we all set up our home offices and started working completely from home .

security malpractices that can leave your business exposed .
Governance policies
It is important to be aware of the governance protocols or policies the cloud provider has put in place . Look for vendors that are transparent about their data centre locations , especially if you have specific data requirements and regulatory obligations . Your data will be subject to the subsequent laws of the location it is stored in . That being said , the host provider must also be knowledgeable about other governing regulations , especially as it pertains to your data . For example , if you have data that must conform to GDPR policies , but the data centre is located across the globe , the cloud provider must be able to abide by GDPR laws . Review the provisions in the company ’ s Service Level Agreement ( SLA ) that address the protocols for handling potential data losses , compensation , or data migration .
Data migration and education
Migrating data is a slow process that requires time and bandwidth , affecting your business ’ ability to operate at its optimal level . Find out how long this process will take to minimise downtime and reduce this time by only migrating data sources that are required .
Invest time and money to get employees up to speed on how to transition to the new cloud environment . This will not only ensure they are clear on security protocols , but it can minimise the chance of breaches as a result of human error . According to global reports , 95 % of cybersecurity breaches were a result of human error , don ’ t let your business become one of these statistics . u
Learn about the provider ’ s shared responsibility model to understand what responsibilities are shared between vendors and users to avoid basic
www . intelligentciso . com | Issue 31
65