31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Amendable Human Error #3 – Lack of Training<br />

Sit a roomful of sales pros down and ask them to answer this question honestly: how many of you have<br />

ever copied a document with sensitive business data from an enterprise cloud database onto your laptop,<br />

so you can work on it on a flight? <strong>The</strong> majority of them will inevitably answer in the affirmative. And they<br />

are, of course, inadvertently guilty of both violating data security and creating shadow data. In doing so,<br />

their actions pose serious risks to your data security, compliance, and governance.<br />

Solution:<br />

This is a training issue, cut and dry. Because you can create all the policies you want and deploy all the<br />

security tools on the market – but if data can be seen on a screen, it can become unsecured shadow<br />

data. Create in-house training regimes that help cloud users better understand the implications of their<br />

everyday actions on organizational security.<br />

<strong>The</strong> Bottom Line<br />

As security professionals, it’s easy to focus on the technological aspects of cloud security. Yet human<br />

error can be a major cause of vulnerabilities in the cloud – and is addressable. By spotlighting rectifiable<br />

human errors—understanding shared security responsibility, tackling misconfigurations, and providing<br />

proper training—we can enhance cloud security and keep our data and our businesses safer.<br />

About the Author<br />

Patrick leads client engagements in North America <strong>for</strong> CYREBRO, and is<br />

responsible <strong>for</strong> regional growth, business development and partnerships. Patrick<br />

brings Fortune 500 management experience in addition to 10 years in Navy military<br />

service with expertise in Intelligence and Reconnaissance, including multiple<br />

international combat tours. Patrick can be reached online at LinkedIn and at<br />

http://www.cyrebro.io.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 67<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!