We’ve heard of the challenges of Amazon S3 Buckets and the exposure of customer data to the world wide web. When cloud storage technology emerged, the new technology had plenty of hype. Companies flocked to the new technology, and they started integrating it into their daily work structure. However, security was usually overlooked, limitations not put into place and nonessential employees given administrative access to make important changes to data.

It’s a new year, so it’s time to find a new approach to your cloud storage security. To help you start the new year off right, we’ve reached out to top cyber security experts in the field to share their insight. This is the question we posed:

What can organizations do right now to ensure security of their cloud storage?

Meet our Panel of Cyber Security Experts:

Lee MunsonJustin Davis
Matt FullerSanjay Beri
Jonathan GosselsJack Miller
Gregory MorawietzAmit Bareket
David DingwallJeremy Vance
Sanjeev VermaMonika Goldberg
Ashwin KrishnanJason Hart
Derek AndersonDouglas Brockett


Cyber Security Predictions for 2018: The Top Experts Speak

Lee Munson is a security researcher at Comparitech.com.

Secure your cloud storage by…

If an organization could do just one thing to enhance the security of its cloud security, it should look at the human element. That means ensuring a robust password policy is in place that requires unique and complex credentials, as well as ensuring access rights management only affords access to those who need it. Additionally, permissions on all files should be set and regularly reviewed to ensure that sensitive documents cannot be shared with inappropriate audiences at any time, either accidentally or otherwise.



Cyber Security Predictions for 2018: The Top Experts Speak

Secure your cloud storage by…

Continually monitoring for security and for configuration vulnerabilities is crucial.

‘95% of cloud security failures will be the user’s fault’ is a recent prediction by Gartner. Simply following best practices could have prevented Deep Root Analytics from exposing 198,000,000 US voter records.

Even the most secure cloud providers only offers security OF the cloud. The user is responsible for security IN the cloud. As groups, roles, devices, etc. change, oversights and misconfigurations open vulnerabilities that lead to outright hacks or just a Financial DDOS.

Unfortunately, a single misstep can compromise your entire infrastructure.



Cyber Security Predictions for 2018: The Top Experts SpeakJonathan Gossels is the president of SystemExperts, a network security consulting firm specializing in IT security and compliance. He plays an active, hands-on role advising clients in compliance, technology strategies, managing complex programs and building effective security organizations. Jonathan brings a business focus to this work, balancing all technical initiatives with business requirements and impact.

Secure your cloud storage by…

In addition to using unique passwords and changing them frequently, organizations should allow regular OS and software update patches, as well as use antivirus that scans emails and Internet URLs looking for malware.



Cyber Security Predictions for 2018: The Top Experts SpeakGregory Morawietz is a cloud and IT Security Specialist for Single Point OC with over twenty years’ of network and security experience. He has worked with hundreds of firms on improving IT environments, architecting cloud environments, consulting and integrating technology for the enterprise network.

Secure your cloud storage by…

Cloud security can start with two factor authentication. You don’t want to have one password open up all of the goodies. Only use a provider that has 2-factor authentication capabilities. That is a start.



Cyber Security Predictions for 2018: The Top Experts SpeakFox Technologies is an authorization and access management vendor, specializing in privileged access management for Linux and UNIX worldwide. Obviously, the company dictates that organizations must ensure they have a robust privilege access management protocol.

Secure your cloud storage by…

Companies are literally spending millions on cloud transition and have not explored fully the impact of security and compliance.

The biggest security issues are all around people, it’s a people problem. There are simply not enough security staff in the world to deal with it. 90 percent of companies are looking for extra security staff while 50 percent are hiring contractors from outside, and it is only going to get worse. The staff who are not IT security specialists have very poor training. There is the assumption that technology is going to solve the security problems but actually, everyone in the organization needs to get their arm around it, it’s a day to day business problem, not just a technology fix.



Cyber Security Predictions for 2018: The Top Experts Speak

Sanjeev Verma is the Co-founder and Chairman, PreVeil. He is a technology entrepreneur with a track record of building successful businesses. In 2000 he co-founded Airvana, which developed mobile wireless infrastructure used by leading mobile operators such as Verizon and Sprint to deliver high speed 3G data services.

Secure your cloud storage by…

Cloud storage services from Google, Microsoft, Box, and Dropbox use an old security paradigm that has fundamental vulnerabilities. Their security architecture allows them to read users’ information and therefore, so can anyone who hacks them. Organizations should consider using new storage solutions that use the gold standard in encryption – end-to-end encryption  – which means that nobody else except the sender and recipient can read a business’ files. So, even if the storage service is hacked, the data appears to the hacker as unreadable.



Cyber Security Predictions for 2018: The Top Experts Speak

Ashwin Krishnan is a CyberMoralist, Cyber Security evangelist, Board advisor, Podcaster, Author, Blogger with over two decades of hi-tech executive experience in the cyber security and virtualization domain. The author of  MobileSecurity for Dummies and a recognized thought leader, he is a regular columnist with CSOOnline.com, ITSPMagazine, ThriveGlobal, CPOMagazine and Qrius. He also regularly contributes to other publications including LightReading.com,  Securitynow.com, CIOreview.com , SDxcentral.com, Virtual-Strategy.com, SoftwareMag.com, TEISS.co.uk, and CloudTweaks.com.

Secure your cloud storage by…

Encrypt ALL of your data using your own key manager preferably hosted on a different cloud (if your data is in AWS S3, run your Key Manager on Azure or Google Cloud for instance) or on you own data center (preferred). And run your own key schedule for periodic re-encryption.


Cyber Security Predictions for 2018: The Top Experts SpeakDerek Anderson’s clients trust him to provide reliable IT solutions with responsive services at Biztek-Solutions. His goal is to become a trusted advisor, partner and vCIO for his clients and is dedicated to protecting his client’s systems through a purposeful and research-backed plan.

Secure your cloud storage by…

One big thing that organizations can do to ensure security of their cloud storage is to enable multi-factor authentication on user account access.  We find that most cloud services have a multi-factor authentication feature; however, most companies do not take advantage of this feature and leave unconfigured.  Multi-factor authentication requires access to cloud data to be authenticated by more than just a username and password, typically the second form of authentication is in the form of a one-time code sent via text message to the user’s phone or via the use of an authenticator app. My company is a Microsoft partner and reseller of Microsoft Office365 for email, OneDrive and Sharepoint.  We require all accounts to be configured with multi-user access to add an additional layer of security. This ensures that if someone’s password is compromised, that an attack cannot use the compromised password alone to access data in the cloud.


Cyber Security Predictions for 2018: The Top Experts SpeakJustin Davis is a Certified Information Security Manager with 10+ years experience in the technology industry. He leads the Enterprise Sales division for CenturyLink in Northern California, specializing in Cybersecurity, Multi-Cloud Management and IoT.

Secure your cloud storage by…

The number one thing organizations can do right now to ensure the security of their cloud storage is enable versioning and restrict administration access to the bare minimum number of users, protected under multi-factor authentication that is not connected through SMS text messaging. This will significantly help mitigate both malicious attacks and the much more frequent user error deletions or changes, and can be implemented quickly and for relatively little cost.



Cyber Security Predictions for 2018: The Top Experts SpeakSanjay Beri brings nearly two decades of innovation, experience, and success in networking and security technology, and a unique business sense, to his role as founder and CEO of Netskope. He has held leadership positions at Juniper Networks, Ingrian Networks, McAfee and numerous other companies.

Secure your cloud storage by…

To protect themselves against breaches and costly legal repercussions, businesses need to work with a CASB to ensure they know and control all of the cloud services in their environment, and also place the proper security controls over cloud services to defend against malware and other threats. Failure to do so increases a company’s exposure to costly and time-consuming data breaches.


Learn More About Teramind


Cyber Security Predictions for 2018: The Top Experts SpeakJack Miller is the CISO at SlashNext. Jack has more than 25 years overall experience and 18 years’ experience as a CISO from a variety of industries at organizations like AAA, County of Riverside, and Pacific Life Insurance. Prior to SlashNext, he held an executive in residence role at Norwest Venture Partners.

Secure your cloud storage by…

With the traditional ‘data center centric’ approach to security, the data center represented your security perimeter so migrating data out of your data center into the cloud significantly increased risk.  However, with a “data centric” security approach, you build your perimeter around your data so it doesn’t matter if your systems are in your data center or in the cloud.  The important thing to remember is ensuring that the principle of least privilege for accessing your data is enforced with a combination of encryption, authentication and authorization controls.

Unfortunately, many migrations result in more people, accounts and systems having elevated levels of access to your data beyond what they actually need, increasing overall risk.  But if you use the migration as an opportunity to really learn how your system works including access and data flows, then through the combination of these controls, the migration can actually increase your overall security.

In addition, new technologies and advanced encryption algorithms actually allow processing functions to be performed on encrypted data allowing organizations to remove system and database administrator access to unencrypted data, effectively putting high risk accounts outside the data centric perimeter where they belong.



Cyber Security Predictions for 2018: The Top Experts SpeakAmit Bareket is Co-Founder and CEO at SaferVPN and their soon-to-launch SDP service, Perimeter 81. He is an entrepreneur and cyber security expert with extensive experience in system architecture and software development. Graduated Cum Laude with a B.Sc. in Computer Science and Economics from Tel Aviv University.

Secure your cloud storage by…

Organizations can implement Software-Defined Perimeter (SDP) solutions to increase security and segment access to their cloud storage resources. Rather than leaving valuable data open to the Internet, businesses can utilize SDP technology to secure their cloud environments and remote access to on-site applications.

While many organizations rely on dated hardware-based VPN technology with a distributed management system and other complicated client applications, these systems are complex, costly and require extensive management and personnel.

To simplify the security of cloud environments, SDP offers secure, easy, manageable & segmented remote network access. Centralized cloud management and comprehensive activity logs also allow organizations to easily view which servers, applications and cloud resources are being accessed, and receive alerts for any suspicious and/or unusual activity.



Cyber Security Predictions for 2018: The Top Experts SpeakJeremy Vance has been in the IT industry for 20-plus years in a variety of leadership positions and roles. Having been on both sides as a producer of cloud security services and also as a consumer, he brings a tremendous amount of perspective to organizations looking to roadmap their IT security strategy. Prior to joining the team at US Cloud, Vance served as CIO at Pabst Brewing Company, and as IT Director for a cloud company before that.

Secure your cloud storage by…

One thing organizations can do right now to ensure security of their cloud storage is verify credentials that are used to manage their admin credentials and guard those keys with their lives. It’s basic credential management and cloud credentials should be treated no differently than credentials for a file server behind the company firewall.



Cyber Security Predictions for 2018: The Top Experts SpeakMonika Goldberg brings over 25 years of industry experience from leadership roles at infrastructure and security companies such as Intel Security, McAfee, Cisco, HP and NetApp. Her unique approach combines Cloud security business and technology acumen with the customer perspective from her previous career leading and consulted to IT teams.

Secure your cloud storage by…

Enterprises migrating workloads and data to and between cloud services –  like Azure – should ensure that they are encrypting their data at rest, and in motion. The trick is finding a solution that allows only the enterprise to keep the keys, and is capable of decrypting, performing deep packet inspection for security, and then safely re-encrypting the data on the fly, and at scale – without having to choose between killing performance SLAs or infrastructure budget.



Cyber Security Predictions for 2018: The Top Experts SpeakJason Hart is a global award-winning cyber security expert and chief technology officer for Gemalto’s data protection solutions. He is a former ethical hacker with 20 years’ experience in the information security industry and has created technologies to keep organizations one step ahead of evolving cyber threats, including the world’s leading cloud-based authentication platform. He is also deeply interested in reducing and researching the risk of password theft, and is globally known for exposing a large number of major password vulnerabilities.

Secure your cloud storage by…

Organizations are benefiting from the convenience that the cloud offers along with its scalability and controlled costs. Though these are great advantages, businesses shouldn’t lose sight of the security of the information they’re inputting into the cloud. Simply adopting cloud services does not guarantee that data will be secure as there are additional steps to be taken to do so.

With that said, it is crucial for organizations to use robust authentication methods to access information and applications in the cloud. Proper controls such as encryption and tokenization should be placed at the source of the data regardless of where it is placed. Organizations will be more secure and less susceptible to data breaches after incorporating these measures.



Cyber Security Predictions for 2018: The Top Experts SpeakDouglas Brockett, president of StorageCraft, has over two decades experience in information technology, storage and security. He joined StorageCraft in January 2017 as a result of the acquisition of Exablox, where he was CEO. Prior to this, he was Vice President and General Manager of SonicWALL responsible for the company’s strategy, corporate development and cloud operations.

Secure your cloud storage by…

Back up and disaster recovery drills are two simple, seemingly obvious, yet often overlooked steps to enable a secure cloud.  Just because it is in the cloud doesn’t mean it doesn’t have to be backed up.  Just because you have a lot of availability in the cloud doesn’t mean data isn’t going to be corrupted.  So back up and be prepared.  When was the last time you tested your disaster recovery or DRaaS?  If you don’t or can’t remember the last time, you have a pretty big data vulnerability waiting to happen.