The Cyber Defense eMagazine August Edition for 2023
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Amendable Human Error #3 – Lack of Training<br />
Sit a roomful of sales pros down and ask them to answer this question honestly: how many of you have<br />
ever copied a document with sensitive business data from an enterprise cloud database onto your laptop,<br />
so you can work on it on a flight? <strong>The</strong> majority of them will inevitably answer in the affirmative. And they<br />
are, of course, inadvertently guilty of both violating data security and creating shadow data. In doing so,<br />
their actions pose serious risks to your data security, compliance, and governance.<br />
Solution:<br />
This is a training issue, cut and dry. Because you can create all the policies you want and deploy all the<br />
security tools on the market – but if data can be seen on a screen, it can become unsecured shadow<br />
data. Create in-house training regimes that help cloud users better understand the implications of their<br />
everyday actions on organizational security.<br />
<strong>The</strong> Bottom Line<br />
As security professionals, it’s easy to focus on the technological aspects of cloud security. Yet human<br />
error can be a major cause of vulnerabilities in the cloud – and is addressable. By spotlighting rectifiable<br />
human errors—understanding shared security responsibility, tackling misconfigurations, and providing<br />
proper training—we can enhance cloud security and keep our data and our businesses safer.<br />
About the Author<br />
Patrick leads client engagements in North America <strong>for</strong> CYREBRO, and is<br />
responsible <strong>for</strong> regional growth, business development and partnerships. Patrick<br />
brings Fortune 500 management experience in addition to 10 years in Navy military<br />
service with expertise in Intelligence and Reconnaissance, including multiple<br />
international combat tours. Patrick can be reached online at LinkedIn and at<br />
http://www.cyrebro.io.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 67<br />
Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.