decrypting myths
cloud credentials which
can lead to catastrophic
data loss.
Therefore, if you have spent
most of your security budget
on firewalls and endpoints, you’re
missing visibility and protection into
your cloud services and the people
who use them. Fortunately, the majority
of customers we spoke with are savvy
about their situation.
Just like email security before it, they
know they need something above
the baseline, above what Office 365
provides if they want to have legitimate
protection for their cloud resources.
Conclusion
Attackers are highly democratic, they’ll
attack just about any organisation
and within each organisation they
will approach different targets with
a combination of targeted and non-
targeted threats.
While solutions like sandboxing and
dynamic threat analysis tools definitely
represent a significant investment for
businesses, if you don’t have them, you
simply won’t gain insight into the attack
until it’s too late. u
www.intelligentciso.com
|
Issue 11
69