The growth in remote working in recent months has highlighted weaknesses in the security chain, not least in unmanaged devices which are being used to remotely access networks. Data in an organisation’s cloud could be fully secured, but with a keylogger installed on an endpoint laptop which has lower security posture, an attacker could have full access as the user logs-in and to everything the user enters at the keyboard or displays in a local application. This is why, along with spyware, keylogging malware has been ranked as the highest threat.
When thinking about securing the data flow in the corporate cloud ecosystem CSO’s should start at the beginning and examine all the threats starting from the moment a user presses a key.
There are three phases to consider:
To find out more about protecting each of these phases and securing data once it reaches the cloud for processing or storage, please read the full article at SC Magazine. Given the vulnerabilities of systems as a result of remote networking, security must be prioritised and it is important to start with an understanding of what is needed at each stage from the first keystroke until data reaches its cloud destination.
Subscribe to our newsletter
Our newsletter, SentryPost, shares insights into the world of cyber security. It includes articles, research data and information on new developments. If you would like to receive this to keep up with the quickly evolving landscape, please complete the form below.
We would be happy to demonstrate how our solutions work and give you an opportunity to talk a member of our expert team and ask questions. If you would like to arrange a date and time, please complete the form below.