Page 10 - Security Today, September/October 2023
P. 10

                                 The Best Line of Defense By David Boland  Of the many challenges plaguing the security in- dustry today, stricter com- pliance regulations are a top concern for many administrators. A main reason for this is because the longer data must be retained, the longer the window of opportunity for a cyberattack grows. With IDC’s Video Surveillance Survey 2022 showing that a growing number of en- terprises are expecting their video surveil- lance storage requirements to increase over the next three years, it is likely these win- dows for attacks will grow even more. Not only can a cyberattack put sensitive data into the hands of bad actors who could de- stroy or tamper with it, but it can also be costly. Recent data found that the average ransom paid is up over $100,000 this year, and that is not counting investigation costs. One of the simplest and most cost- effective means to protect security data against ransomware threats is by storing a second copy in the cloud. Cloud storage offers several key benefits when it comes to fighting cyberattacks, including, zero- trust, immutability, and scalability. WHY A ZERO-TRUST APPROACH TO CLOUD STORAGE IS KEY Now that enterprises operate in an age of interconnected access to data, many have seen the need to adopt a less trusting model of security where focus is placed on users and Color4260/Shutterstock.com theiraccesstocertainresourcesanddata.Asa result, many have adopted zero trust security, an approach that requires all members of an organization to be authenticated and authorized to access sensitive data. A major part of zero trust that security administrators must keep an eye on is cloud storage. Since the cloud can potentially be vulnerable to cyberattacks, administrators should take added zero trust precautions. This can include end-to-end encryption, two- factor authentication, and immutable buck- ets. The less access users have to data, the better it is protected from malicious changes, deletion, or encryption from bad actors. THE IMPORTANCE OF AN HAVING A COPY IN THE CLOUD Most surveillance video is still traditionally stored on premises. However, there are numerous benefits to storing a copy in the cloud, from freeing up on-site storage space, to safeguarding a copy against other security incidents like ransomware or accidental deletion. Since the onset of the cloud, this strat- egy has evolved to consist of another added layer of protection, which is an im- mutable copy of data. An immutable layer is locked and cannot be altered or deleted. Companies leave the replication of the cloud copies to the cloud vendor. The user backs up to one cloud loca- tion and the cloud vendor replicates the backup, remaining unseen by the corpo- rate network. An immutable copy of data is critical to any cybersecurity strategy, consider- ing security administrators must plan for any kind of incident that can occur. Since most ransomware attacks occur because of human error, an additional layer of im- mutable backup can help restore data if it is affected by an attack. This layer is “air gapped,” which means it is disconnected from the corporate net- work, making it impenetrable from poten- tial hackers. It also helps ensure the chain of custody for evidence in investigations. SIMPLE ABILITY TO SCALE UP AND DOWN As security footage regulations change, theamountofcontentthatthecloudmust store also changes. Cloud storage allows for administrators to easily scale their storage up or down, based on demand. This is especially helpful for organizations that use motion- based cameras and have busier times of year, for example sports stadiums or schools. For states or organizations that require longer retention time, it is even more criti- cal to have secure cloud storage, since bad actors have more time to plan their attacks. By being able to increase or decrease cloud storage as needed, security administrators can ensure that the necessary data is being protected for the required amount of time. This way, they are meeting regulations while also keeping data and security footage safe. Ensuring protection is not a simple task. It requires thorough planning and regular reassessment and checkups. Beyond cloud storage, organizations should ensure that they are regularly training their employees on cybersecurity best practices, such as how to spot phishing emails and updating who is authorized to access data. With regu- lar cybersecurity assessments and proper cloud storage, security administrators can ensure that they are protecting their data from bad actors to the best of their ability. David Boland is the vice president of cloud strategy at Wasabi Technologies.    10 SEPTEMBER/OCTOBER 2023 | SECURITY TODAY CLOUD SECURITY  


































































































   8   9   10   11   12