search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Cloud


processes. For SMB IT teams, getting this data can be a challenge, let alone bringing it all together in one place so that they can make decisions on it. Te situation is exacerbated in cloud environments where


technology adoption is much more rapid compared to more traditional on-premises environments. Tis is especially true in the workload space where the rapid adoption of Platform as a Service options, new soſtware delivery and development methods like containers and now serverless functions have historically outpaced security tooling development.


How to get ahead in security To be effective around all these moving parts, IT teams need to be able to prioritise. Rather than running aſter each and every new issue, the trick is to work on a preventative approach that stops as many potential problems as possible before they start. For your customers, this will involve looking for tooling and support that can systematically review their cloud security posture and provide advice on where to focus. Once implemented, these findings need to be reviewed on a regular cadence to ensure a strong security posture. Tere are also managed services available for these types of tools


to ensure security is top of mind and monitored around the clock. For SMB teams that may be one or two people strong, this service- based approach can be the difference between keeping up with potential threats or falling behind. Tis should include finding and fixing potential misconfigurations to cloud infrastructure, as well as implementing vulnerability assessments for relevant workloads, whether they’re traditional servers, virtual machines or container- based instances. Alongside cloud workloads, SMBs also have to think about cloud Identities for their employees. Tis will include what assigned roles,


“In Europe, around 42.5 percent of SMBs use cloud computing, while the UK has more than 58 percent of SMBs using the cloud for their technology needs.”


permissions, and access to corporate systems users have. You should actively review those roles and permissions on a regular basis, so that employees have only what is absolutely necessary to complete their tasks. By reducing these permissions, you reduce the number of attack vectors to your environment and reduce the blast radius of what a set of compromised credentials could achieve. Beyond the technology issues, small firms may not have the


resources to implement IT security training necessary to drive awareness throughout the organisation, and reduce risks like phishing and social engineering. Providing additional support and relationship building events can provide that opportunity to meet more people within your customer organisation - as well as delivering updates and training, this can be a good opportunity to discover more cloud business upsell opportunities over time.


www.pcr-online.biz


March/April 2024 | 35


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52