How do you ensure data security in the cloud?

In a digital world focussed on the modern workplace and hybrid working, businesses are reaching out for effective, affordable and accessible cloud solutions. However, in the charge for convenience, it’s easy to lose sight of key information and stay in control of data security. And as we see in the news on an almost daily bases, cybercriminals are lurking in the background waiting to strike the minute an vulnerabilities are exposed.

The risks related to cloud data security include insider threats, data loss, data breaches, insecure UIs, data sprawl and of course staying compliant.

What is the latest cloud data security data telling us?

Here’s an overview of the some of the latest research surrounding data security in the cloud:

In 2022, 31% of CISOs listed insider threats as a significant cybersecurity risk (Statista)

The 2023 Insider Threat Report by Cybersecurity Insiders also states that:

• 74% of organizations say insider attacks have become more frequent

• 74% of organizations say they are at least moderately vulnerable or worse to insider threats

• More than half of organizations have experienced an insider threat in the last year, and 8% have experienced more than 20

• 68% of respondents are concerned or very concerned about insider risk as their organizations return to the office or transition to hybrid work; only 3% are not concerned

• 53% say detecting insider attacks is harder in the cloud

The top 3 Insider Threat actors are: employees, privileged users and administrators and third parties.

According to Gartner the key factors contributing to new insider threats include: cloud attacks; supply chain attacks; and hybrid office environments.

What’s the answer and where does Torsion come in?

Well, according to Gartner, half of medium and large enterprises will adopt structured security to identify insider threats by 2025, up from 10% today.

And the key role of the tools that organisations are adopting is ‘unified visibility’. Not only until all user activity can be seen from one place, can an organisation be in control of who has access to what in the modern workplace.

Torsion provides that unified visibility. It’s like a 24-hour guard of your digital data access and sharing. Torsion monitors every user activity and detects security threats in real time. It’s literally watching your back around the clock. If any threats or unauthorised access are detected by Torsion, it allows data owners to respond directly, speeding up the entire data access security process.

And another key advantage of Torsion is it’s not just another cloud platform that requires it’s own space. Torsion actually sits within the existing Microsoft 365 UI – an extra ‘security’ tab in Teams, Sharepoint or OneDrive. So users really can have that unified visibility and control of who has access to their data.