When the COVID-19 epidemic was at its worst, businesses had to change their technology strategy, allow workers to work remotely or in hybrid environments, and rely on cloud solutions to keep operations running. Since then, the speed at which organisations are transforming to the cloud has increased and shows no indications of slowing. But because of the serious security issues that this quick and systemic shift is posing, businesses are being forced to reconsider their security plans at all levels of operation.
Since then, the speed at which organisations are transforming to the cloud has increased and shows no indications of sloing. But because of the serious security issues that this quick and systemic shift is posing, businesses are being forced to reconsider their security plans at all levels of operation.
When the COVID-19 epidemic was at its worst, businesses had to change their technology strategy, allow workers to work remotely or in hybrid environments, and rely on cloud solutions to keep operations running. Since then, the speed at which organisations are transforming to the cloud has increased and shows no indications of slowing. But because of the serious security issues that this quick and systemic shift is posing, businesses are being forced to reconsider their security plans at all levels of operation.
Since then, the speed at which organisations are transforming to the cloud has increased and shows no indications of sloing. But because of the serious security issues that this quick and systemic shift is posing, businesses are being forced to reconsider their security plans at all levels of operation.
The complexity of maintaining sensitive data across several cloud environments and the related data classification issues only serve to exacerbate these difficulties. The risk of assaults involving the cloud can rise when data is stored there. In fact, 45% of respondents—up from 35% in 2021—said they had encountered a data breach involving data stored in the cloud.
Only 19% of respondents claimed to be aware of where all of their data is kept, despite 66% of respondents saying that up to 60% of their sensitive data is stored in the cloud. Only 25% of those surveyed claimed to be able to fully classify their data. The paper notes that these low percentages are probably a result of multi-cloud settings’ complexity, as data storage is spread across multiple cloud providers.
Encryption that is properly implemented reduces the danger of sensitive data exposure for an organisation. When asked how businesses maintain encryption in IaaS and platform-as-a-service environments, respondents mentioned using both the platforms of cloud providers and their own platforms.
According to the study results, 39% of respondents claimed that more than half of their applications use cloud provider encryption, while just 13% only use their own encryption.
An organisation can reduce the dangers of potential data exposure to third parties and the difficulty of managing encryption across many clouds by implementing a robust bring your own encryption (BYOE) solution. BYOE increases trust in the security of the organization’s data and its adherence to all applicable rules and laws.
Encryption that is properly implemented reduces the danger of sensitive data exposure for an organisation. When asked how businesses maintain encryption in IaaS and platform-as-a-service environments, respondents mentioned using both the platforms of cloud providers and their own platforms.
According to the study results, 39% of respondents claimed that more than half of their applications use cloud provider encryption, while just 13% only use their own encryption.
An organisation can reduce the dangers of potential data exposure to third parties and the difficulty of managing encryption across many clouds by implementing a robust bring your own encryption (BYOE) solution. BYOE increases trust in the security of the organization’s data and its adherence to all applicable rules and laws.
Only 15% of survey respondents said they had complete control over their encryption keys, a little improvement from the results from the previous year, according to the poll responses. In response to the question of who controls the encryption keys, survey findings revealed that in some circumstances, customers did so and in other cases, cloud providers did.
According to the findings, which are highlighted in the research, there may be a chance for organisations to centralise and consolidate on independent third-party platforms with bring your own key (BYOK) capabilities that lessen complexity and offer coverage across multi-cloud environments.