Data Security in the Cloud: Part 2

In Part 1 of the article, we discussed some major vulnerabilities stemming from cloud-sharing services, including opening emails from unknown addresses due to routinization, lack of a personal stamp on such emails causing lack of authenticity, unverifiable hyperlinks, and ultimately, the violation of cyber safety training drills. In Part 2, we will explore the solutions to these technical issues.

Industry groups like Cloud Security Alliance can take a holistic gauge of how users dive into different cloud environments and estimate their risk. Indispensable in the process of preventing the violation of our security is delving into users’ CRB (Cyber Risk Beliefs): mistaken assumptions of the risks of their online actions, for example, believing that any website starting with ‘https’ is legitimate. It involves more than implementing robust authentication protocols and encryption standards, needing a unified effort by cloud service providers. According to Dr. Arun Vishwanath, New York, for improving user security on cloud platforms, cloud portals must collaborate and curate a virtualized space in which all links are generated and shared. Thus, the domains or portals from which the users receive links will be more uniform and familiar to them, ensuring their safety. This way, emails aren’t sent from unknown virtual in-boxes, and personalization is expected and achieved.

We must also improve User Interface (UI) design, where the focus is on safety rather than convenience. UI should foster more personalization in shared emails, where users shouldn’t be permitted to exchange mails without a personal subject line or signature, to indicate authenticity. UI design could also integrate file-sharing portals with email services, so links aren’t being generated from the portal directly but from email accounts that people are familiar with.

Finally, we must train end-user to detect and prevent violations of cyber safety. This means fostering new practices like using passwords and personalized messages while sharing, gauging whether a shared hyperlink is a spoof, and deploying them in virtualized environments. Making such corrections is important now more than ever, as a single breach can disrupt user trust in the entire cloud experience.

For further information on data security, please click on this link https://www.arunvishwanath.us/2020/09/15/data-security-in-the-cloud-part-2/ 

Scroll to top