{"id":101,"date":"2020-01-08T06:43:41","date_gmt":"2020-01-08T06:43:41","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=101"},"modified":"2020-02-05T08:31:20","modified_gmt":"2020-02-05T08:31:20","slug":"the-cyber-security-challenges-of-the-cloud","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/the-cyber-security-challenges-of-the-cloud\/","title":{"rendered":"The Cyber Security Challenges of the Cloud"},"content":{"rendered":"\n<p>The surge in business processes supported by cloud services has been  well evidenced by organizations using cloud services store confidential  data in the cloud environment. But when using cloud services,  organizations are still unsure whether to entrust cloud service  providers (CSPs) with their data. CSPs generally provide a certain level  of security as substantiated by multiple surveys, but cloud-related  security incidents do occur. <\/p>\n\n\n\n<p>CSPs cannot be solely responsible for the security of their customers\u2019  critical information assets. Cloud security relies equally on the  customer\u2019s ability to implement the right level of information security  controls. Nevertheless, the cloud environment is complex and diverse,  which hinders a consistent approach to deploying and maintaining core  security controls. It is vital that organizations are aware of and  fulfill their share of the responsibility for securing cloud services to  successfully address the cyber threats that increasingly target the  cloud environment. <a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/conquering-the-cyber-security-challenges-of-the-cloud\/?mc_cid=4332c1d074&amp;mc_eid=7abb4329f3\">Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed  solutions to automated, manage threat intelligence, forensic  investigations and cyber security training. Our objective is to support  organisations and consumers at every step of their cyber maturity  journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a>   <\/p>\n","protected":false},"excerpt":{"rendered":"<p>The surge in business processes supported by cloud services has been well evidenced by organizations using cloud services store confidential data in the cloud environment. But when using cloud services, organizations are still unsure whether to entrust cloud service providers (CSPs) with their data. CSPs generally provide a certain level of security as substantiated by &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/the-cyber-security-challenges-of-the-cloud\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The Cyber Security Challenges of the Cloud&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[11],"tags":[],"class_list":["post-101","post","type-post","status-publish","format-standard","hentry","category-cloud"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=101"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/101\/revisions"}],"predecessor-version":[{"id":167,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/101\/revisions\/167"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}