Cloud security:

How to stay in front of the GDPR

Cloud security: how to stay in front of the GDPR

Lap 1: assess your apps

First thing? You want an overview of all the apps that are connected to your network. This type of assessment is both fast and affordable. The resulting report gives you a comprehensive list of all used apps, with a risk score – overall and per app.

The risk score indicates the strong and weak points of each app’s security. For instance, if a popular app doesn’t have multifactor authentication – while your security policy states that it must – the assessment offers a clear choice: banish the app from your network or keep the app and live with the consequences.

Pro tip: check whether the paying version of the app has better security features – if so, it is worth the investment almost 100% of the time. Why? Because the paid version offers an advantage for your organization: monitoring app usage. And that’s important for the second part of the race.

Lap 2: set the stage

Collected all information? Time to make some tough decisions and set the ground rules. Often the most basic rule is that the IT department gets a popup when a document containing personal information has been shared. The popup is not just a reminder, it signals that the action has been logged. In other words, the rules can detect if someone is breaking your company policy. Say that you have a strict policy that forbids sharing sensitive information (e.g. a bank account number); thanks to the rules, the IT department now has the tools to sanction appropriately.

Lap 3: control theinformation grid

Your system all set up? Start monitoring the traffic from your network to the cloud. Your employees will keep finding new apps that they find convenient or interesting. It is your task to track the use of these apps and take action when they pose a security threat. With this simple solution, you can both protect your network and boost employee productivity.

Need a cloud coach?

Not entirely sure how to start this process? Our solution advisors will gladly help you out. Just fill in the form below and we will be in touch as soon as possible!

Get in touch
  • Managed Security
  • IT-Security, Security, GDPR, Data Security, Data Management

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment


Peter Verbeeck, Author SoftwareONE Blog

Peter Verbeeck

IT-Security Solution Advisor

IT-Security Solution Advisor

Related Articles

Cyber Security Update August / September 2020
  • 07 September 2020
  • Bala Sethunathan
  • Cybersecurity, Managed Security
  • Ransomware

Cyber Security Update - August/September 2020

Data breaches like these show that one single breach can not only irreparably damage the firm’s brand, but also jeopardize clients’ names and operations. Read more about recent attacks.

  • 01 September 2020
  • Bala Sethunathan
  • Managed Security
  • Microsoft

Securing Workforces with ATP & SOC

Microsoft ATP promises cutting-edge security to remote workforces – but your workforce should still invest in a SOC to stay secure. Here’s why.

  • 27 August 2020
  • Mathew Showers
  • Managed Cloud, Digital Transformation
  • Managed Infrastructure

Bridging the IT Skills Gap: How to Keep Up with the Market and Stay Efficient

The IT skills gap is widening and your organization must know how to keep up. Learn more about how to stay efficient while bridging the IT skills gap.