Technology Magazine May 2024 | Page 135

“ Restricting access to only authorised personnel and ensuring strong authentication measures reduce the risk of unauthorised access and data breaches ”

“ Restricting access to only authorised personnel and ensuring strong authentication measures reduce the risk of unauthorised access and data breaches ”

SIMON CROCKER SENIOR DIRECTOR – SYSTEMS ENGINEERING ( WESTERN EUROPE ), CARBON TRUST
“ Restricting access to only authorised personnel and ensuring strong authentication measures reduce the risk of unauthorised access and data breaches .”
He also highlights the importance of visibility across workloads , access permissions and data in cloud environments . “ Organisations need to consider how this is achieved in a holistic , consistent , and scalable way , across a potential multi-cloud environment .”
Continuous monitoring and threat detection are also critical aspects of cloud-based cyber resilience .
“ Organisations must deploy advanced security monitoring tools and employ techniques such as anomaly detection and behaviour analytics to detect suspicious activities and potential threats in real-time .”
Monitoring cloud infrastructure and user activities , and conducting regular security audits and assessments can detect unauthorised access attempts , identify vulnerabilities and ensure compliance with security policies . Finally , Simon also underscores the crucial role employees play in building a cyber-resilient organisation . “ Providing comprehensive cybersecurity training and awareness programs to educate them about cloud security best practices , phishing scams , and social engineering tactics will encourage a security-conscious culture and empower employees to report suspicious activities promptly .”
The role of AI in driving cyber resilience AI ’ s role in cybersecurity is evolving rapidly , with disinformation campaigns and the creation of deep fakes posing challenges to discern real information
technologymagazine . com 135