Page 39 - index
P. 39
Automating threat response is crucial to ensuring that threats are stopped without delay. Delays in
threat mitigation can result in a data breach. Ignoring the warning signs whilst administrator’s sleep
can lead to catastrophic data breaches.
Additionally, alert fatigue can cause administrators to ignore the warning signs. Every administrator
receives countless automated notifications from their security appliances.
There are well known data breaches that resulted in part due to alert fatigue. The potential
catastrophic consequences of alert fatigue are a good reason to automate threat response.
Measured approaches to threats such as blocking requests, suspending user accounts or simply
locking access for a pre-determined period may be all that it takes to defeat threats whilst limiting
the potential for business interruption.
Summary
With more and more companies conducting business in the cloud, one would assume that all third-
party application providers would make security their number one priority. But that is not necessarily
the case.
As a result, businesses are being forced to take control of their own cloud security and make a best
effort to protect their data and, ultimately, themselves.
The fact that the cloud is still relatively young and evolving makes solving the security puzzle
complex, but the tools exist to secure a company’s data in the cloud and protect businesses against
data loss, leaks and breaches.
About The Author
Anthony Scotney is founder & CEO of StratoKey.
StratoKey's intelligent cloud data protection is designed to
address critical security vulnerabilities with cloud and SaaS
applications. StratoKey utilizes encryption, behavioral
analytics and strategic countermeasures to prevent data
breaches. Anthony can be reached via
www.stratokey.com.
39 Cyber Warnings E-Magazine – September 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide