{"id":5436,"date":"2016-03-15T15:21:11","date_gmt":"2016-03-15T14:21:11","guid":{"rendered":"https:\/\/www.esferize.com\/improve-the-security-of-your-cloud-in-three-steps\/"},"modified":"2021-09-23T16:20:49","modified_gmt":"2021-09-23T14:20:49","slug":"improve-the-security-of-your-cloud-in-three-steps","status":"publish","type":"post","link":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/","title":{"rendered":"Improve the security of your cloud in three steps"},"content":{"rendered":"<p><strong>The use of the cloud in enterprises is already a reality<\/strong>.\u00a0Most have at least one type of cloud service. Others have moved their entire IT departments to the cloud. However, increased use does not guarantee total shielding from cybercriminal attacks or device breaches. A <strong>risk that has increased as the BYOD trend<\/strong> \u2014the use of personal devices for work purposes\u2014 is gaining ground in the office.<\/p>\n<p>The problem lies in the moment workers connect their devices to company information: the encryption of documents disappears and they are exposed in the cloud. <strong>With 70 million smartphones lost every year, the risk of exposure is the order of the day<\/strong>, and this is one of the main causes of data breaches.\u00a0In order to avoid these incidents, try to follow these three steps to improve your cloud security:<\/p>\n<h3>Encrypt data from files<\/h3>\n<p>It is not enough to encrypt the perimeter or to encrypt folders in isolation; <strong>it is necessary to encrypt the information at the file level<\/strong>. This option protects the information itself \u2014it does not &#8220;wrap&#8221; it like other encryption options, which isolate the information\u2014.<\/p>\n<p>In this way, files will remain encrypted wherever they go, before and after being in contact with the cloud, both on mobile phones and on any other device. Only authorised users will be able to retrieve them.<\/p>\n<h3>Deploying a CASB security system<\/h3>\n<p>This type of security system is specific to the cloud. It is currently used by only 5% of enterprises, but is expected to reach 85% by 2020. It is a <strong>unified security solution<\/strong> that allows teams of administrators to <strong>detect dangerous data loss, implement protection and execute security protocols<\/strong> all at the same time.<\/p>\n<p>In addition, it also allows administrators to monitor how company files are being shared. The CASB system makes it highly visible where the most sensitive information is located and who has access to it.<\/p>\n<h3>Separate encryption content from keys<\/h3>\n<p>When the encryption keys are separated from the content, it is almost impossible for a hacker to gain access, so it is important to ensure that the security solution employed by the IT department uses this type of system. This way, <strong>even if it is exposed to the cloud, it is unlikely that hackers will be able to access the information<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p>We hope this information has helped you. At<a href=\"https:\/\/www.esferize.com\/en\/\"><strong> Esferize <\/strong><\/a>we have a <strong>team specialised in Internet security<\/strong> that approaches the problem from various lines of action. If you would like further information on this or any other subject, our team will be happy to help you.<\/p>\n<p>&nbsp;<\/p>\n<p>Source: <a href=\"https:\/\/www.computerworld.es\/home\">ComputerWorld<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The use of the cloud in enterprises is already a  [&#8230;]<\/p>\n","protected":false},"author":7,"featured_media":5848,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[250,228,223],"tags":[260,251,253,327,230,328,330,233,329,331],"class_list":["post-5436","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company","category-security-on-the-internet","category-technology","tag-byod-en","tag-cloud-en","tag-cloud-en-2","tag-data-encryption","tag-esferize-en","tag-hackers-en","tag-it","tag-security-on-the-internet","tag-technological-solutions","tag-virtualization"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Improve the security of your cloud in three steps - Esferize<\/title>\n<meta name=\"description\" content=\"The use of the cloud in companies is already a reality. With these tips, you can improve the security of your cloud in three steps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Improve the security of your cloud in three steps - Esferize\" \/>\n<meta property=\"og:description\" content=\"The use of the cloud in companies is already a reality. With these tips, you can improve the security of your cloud in three steps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/\" \/>\n<meta property=\"og:site_name\" content=\"Esferize\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-15T14:21:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-23T14:20:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esferize.com\/wp-content\/uploads\/2016\/03\/cloud-computing-network-connection-perforated-paper-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"esferize\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"esferize\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/\"},\"author\":{\"name\":\"esferize\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/9137a26404c991f5612837aacf59c0a3\"},\"headline\":\"Improve the security of your cloud in three steps\",\"datePublished\":\"2016-03-15T14:21:11+00:00\",\"dateModified\":\"2021-09-23T14:20:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/\"},\"wordCount\":436,\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/cloud-computing-network-connection-perforated-paper-scaled.jpg\",\"keywords\":[\"BYOD\",\"cloud\",\"Cloud\",\"data encryption\",\"Esferize\",\"Hackers\",\"IT\",\"Security on the Internet\",\"Technological solutions\",\"virtualization\"],\"articleSection\":[\"Company\",\"Security on the Internet\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/\",\"name\":\"Improve the security of your cloud in three steps - Esferize\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/cloud-computing-network-connection-perforated-paper-scaled.jpg\",\"datePublished\":\"2016-03-15T14:21:11+00:00\",\"dateModified\":\"2021-09-23T14:20:49+00:00\",\"description\":\"The use of the cloud in companies is already a reality. With these tips, you can improve the security of your cloud in three steps.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/cloud-computing-network-connection-perforated-paper-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/cloud-computing-network-connection-perforated-paper-scaled.jpg\",\"width\":1920,\"height\":1281,\"caption\":\"Cloud computing network connection perforated paper\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/improve-the-security-of-your-cloud-in-three-steps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Improve the security of your cloud in three steps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"name\":\"Esferize\",\"description\":\"Connect to the future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\",\"name\":\"Esferize Comunicaciones S.L.\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"width\":453,\"height\":100,\"caption\":\"Esferize Comunicaciones S.L.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/esferize-comunicaciones\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/9137a26404c991f5612837aacf59c0a3\",\"name\":\"esferize\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g\",\"caption\":\"esferize\"},\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/author\\\/esferize\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Improve the security of your cloud in three steps - Esferize","description":"The use of the cloud in companies is already a reality. With these tips, you can improve the security of your cloud in three steps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/","og_locale":"en_US","og_type":"article","og_title":"Improve the security of your cloud in three steps - Esferize","og_description":"The use of the cloud in companies is already a reality. With these tips, you can improve the security of your cloud in three steps.","og_url":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/","og_site_name":"Esferize","article_published_time":"2016-03-15T14:21:11+00:00","article_modified_time":"2021-09-23T14:20:49+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2016\/03\/cloud-computing-network-connection-perforated-paper-scaled.jpg","type":"image\/jpeg"}],"author":"esferize","twitter_card":"summary_large_image","twitter_misc":{"Written by":"esferize","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/#article","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/"},"author":{"name":"esferize","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/9137a26404c991f5612837aacf59c0a3"},"headline":"Improve the security of your cloud in three steps","datePublished":"2016-03-15T14:21:11+00:00","dateModified":"2021-09-23T14:20:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/"},"wordCount":436,"publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"image":{"@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2016\/03\/cloud-computing-network-connection-perforated-paper-scaled.jpg","keywords":["BYOD","cloud","Cloud","data encryption","Esferize","Hackers","IT","Security on the Internet","Technological solutions","virtualization"],"articleSection":["Company","Security on the Internet","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/","url":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/","name":"Improve the security of your cloud in three steps - Esferize","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/#primaryimage"},"image":{"@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2016\/03\/cloud-computing-network-connection-perforated-paper-scaled.jpg","datePublished":"2016-03-15T14:21:11+00:00","dateModified":"2021-09-23T14:20:49+00:00","description":"The use of the cloud in companies is already a reality. With these tips, you can improve the security of your cloud in three steps.","breadcrumb":{"@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/#primaryimage","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2016\/03\/cloud-computing-network-connection-perforated-paper-scaled.jpg","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2016\/03\/cloud-computing-network-connection-perforated-paper-scaled.jpg","width":1920,"height":1281,"caption":"Cloud computing network connection perforated paper"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esferize.com\/en\/improve-the-security-of-your-cloud-in-three-steps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.esferize.com\/en\/"},{"@type":"ListItem","position":2,"name":"Improve the security of your cloud in three steps"}]},{"@type":"WebSite","@id":"https:\/\/www.esferize.com\/en\/#website","url":"https:\/\/www.esferize.com\/en\/","name":"Esferize","description":"Connect to the future","publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esferize.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esferize.com\/en\/#organization","name":"Esferize Comunicaciones S.L.","url":"https:\/\/www.esferize.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","width":453,"height":100,"caption":"Esferize Comunicaciones S.L."},"image":{"@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/esferize-comunicaciones"]},{"@type":"Person","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/9137a26404c991f5612837aacf59c0a3","name":"esferize","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g","caption":"esferize"},"url":"https:\/\/www.esferize.com\/en\/author\/esferize\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/comments?post=5436"}],"version-history":[{"count":0,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5436\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media\/5848"}],"wp:attachment":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media?parent=5436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/categories?post=5436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/tags?post=5436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}