It may be their cloud, but it’s your data

A person at a laptop with a secure lock symbol in a cloud floating above it.
(Image credit: Shutterstock / laymanzoom)

The rapid growth of cloud technologies aiding remote and hybrid working has become an accepted part of doing business. According to a recent study by McKinsey & Company, companies have accelerated their cloud adoption by three years compared to pre-pandemic adoption rates, and Gartner is estimating that spending on public cloud services will exceed $480 billion next year.

About the author

Poupak Modirassari-Enbom is Vice President of Global Marketing at Thales.

Ongoing supply chain challenges may too be a factor that has accelerated the adoption of cloud technologies – in order to improve overall efficiency and flexibility. This ongoing increase in cloud adoption comes down to the benefits it offers in enabling the digital transformation wave, that’s kicked into hyper gear over the past eighteen months. Whether it’s to stay agile and increase performance or reduce complexity and IT cost, we can agree that moving to the cloud is bringing companies competitive advantages.

Your data. Their cloud

A key topic that many businesses need to address when transitioning to the cloud is cybersecurity. With many organizations operating across multiple clouds for different applications and workloads, each has their own set of security processes and protocols. This can be tricky to keep on top of and lead to gaps around control, visibility and operational efficiency.

In an era where users access data from multiple locations, primarily outside of the core company network, failing to secure information stored or moving through cloud environments can be costly. Regulations and rules such as GDPR and Schrems II also require companies to protect their data and the privacy of their end-users by keeping their security protocols up to date using best of breed technology.

One of the reasons businesses can fall short is due to a lack of awareness that the responsibility to protect sensitive data remains with owner, not the cloud provider. Some mistakenly assume that it is the responsibility of their cloud provider to take the necessary steps to protect sensitive data. Ultimately, businesses need to realize if it’s their data, then it is their responsibility to protect it, no matter where it resides.

So, what can businesses do to ensure they’re able to take advantage of the cloud without compromising their security?

1. Invest more in security talent

Before businesses can go about protecting themselves in the cloud, they need to ensure they’re set up organizationally. By investing in and dedicating more internal resources for cybersecurity and adapting a Zero Trust Strategy, a framework with strict and continuous identity verification and data control, C-level execs will demonstrate their leadership.

2. Know where your data is

Before any strategy can be adopted, organizations must understand what data they have and where it is. It’s impossible to devise a strategy to protect data if the company doesn’t know what data it has or where it’s being stored. Conducting an audit is vital to understanding not only what data there is, but which data sets should be considered most sensitive.

3. Protect your data

Once the sensitive data has been identified and located, it is vital that the business focuses on protecting the data and attaching security to the data itself. Perimeter defenses are no longer effective in the cloud. Implementing encryption protects that data at its core and renders it useless to anyone not authorized to access it.

4. Control the keys and access to your data

Encrypting data automatically creates an encryption key – a unique tool that can unlock and lock data. Protecting these keys are vital. Those keys should be in control by you, not the cloud provider. Without control of the keys, the cloud provider could be required to hand them over to a government or even worse exposing the keys and basically handing the keys to the kingdom straight to the hackers.

Once the keys are secure, it is important to implement the protocols that ensure only authorized people can access the information. Implementing multi-factor authentication is key here. It uses an extra piece of information to verify the user’s identity in addition to their user name and password. As passwords can easily be stolen, multi-factor authentication is vital for a successful cloud security strategy.

Cloud security is an ongoing process and businesses must continually be assessing their strategies. Whenever any new data comes into the system or is created, businesses must repeat the above steps. Carried out correctly, these processes will ensure only those authorized to access the data can do so.

The cloud is essential to the way businesses operate. From scalability, agility, increased speed to market and improving overall competitiveness, the benefits will set companies, no matter their size, on a strong footing to take on the digitally enabled world and grow their customer base. Security is a huge part of this and no cloud strategy can be successful without a data protection counterpart to back this up.

In a world of increased awareness, alongside daily news on data breaches, businesses need to build trust that they’re able to protect sensitive data no matter where it resides.

Poupak Modirassari-Enbom is Vice President of Global Marketing at Thales.

Read more
Cloud, networking and internet
Under the hood of data sovereignty
Cloud computing graphics.
Sovereign Cloud: redefining the future of secure digital innovation
Cloud computing graphics.
Cloud repatriation – how to balance repatriation effectively and securely
Digital clouds against a blue background.
Navigating the growing complexities of the cloud
An abstract image of digital security.
Three tactics to creating a more secure supply chain
ai quantization
Shadow AI: the hidden risk of operational chaos
Latest in Pro
Branch office chairs next to a TechRadar-branded badge that reads Big Savings.
This office chair deal wins the Amazon Spring Sale for me and it's so good I don't expect it to last
Saily eSIM by Nord Security
"Much more than just an eSIM service" - I spoke to the CEO of Saily about the future of travel and its impact on secure eSIM technology
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business
FlexiSpot office furniture next to a TechRadar-branded badge that reads Big Savings.
Upgrade your home office for under $500 in the Amazon Spring Sale: My top picks and biggest savings
Beelink EQi 12 mini PC
I’ve never seen a PC with an Intel Core i3 CPU, 24GB RAM, 500GB SSD and two Gb LAN ports sell for so cheap
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Latest in Features
Saily eSIM by Nord Security
"Much more than just an eSIM service" - I spoke to the CEO of Saily about the future of travel and its impact on secure eSIM technology
A collage image showing images from the TV shows The White Lotus on Max, Black Mirror on Netflix and The Handmaid's Tale on Hulu.
I'm pausing my Prime Video, Apple TV+ and Paramount+ subscriptions in April 2025 – here are the 3 streaming services I'm keeping instead
Gemini on a smartphone.
Gemini is pulling ahead of ChatGPT – combining Deep Research with Audio Overviews is one of the best uses of AI I’ve seen so far
The Rookie
The Rookie is Hulu's #1 show – here are 3 police procedural dramas with over 80% on Rotten Tomatoes to watch next
Grok Image Edits
I tried Grok’s new AI image editing features – they’re fun but won’t replace Photoshop any time soon
Intel Core Ultra PCs
“No matter who you are, what you do, what form factor you choose” - how Intel is bringing AI advantage and unrivaled security to every industry and ecosystem