Home / Industry

To our readers: Does your company offer DNS or DNS Security services? CircleID has an opening for an exclusive sponsor for our DNS topic. Gain unparalleled results with our deep market integration. Get in touch: [email protected]

3 Key Recommendations to Trust the Cloud More by Trusting It Less

Cloud outages happen all the time, but there has been an observed increase in major outages in recent years. In 2021, the increase was exponential with many notable incidents in the month of June 2021. These outages are affecting a significant number of companies of various sizes.

Source: Notable Network and Cloud Outages of 2021 by Total Uptime

The Cloud exists on the internet and was built on trust—yet the internet is, unfortunately, intrinsically insecure by design. Repeatedly, we see that trust being abused by cybercriminals exploiting the vulnerabilities on the internet. So why are companies still moving to the Cloud?

The Cloud presents a suite of benefits, and with the pandemic accelerating digital transformation, over 90% of companies are planning to or have migrated to the cloud1

Alban Kwan, CSC regional director, East Asia, recently presented three key recommendations to address “The Cloud trust paradox”—expanding on an opinion that Google® shared—“to trust Cloud computing more, you need the ability to trust it less2.”

  1. Expect outages and build redundancy on the connector of the Cloud—that is, the domain name system (DNS). Consider separate DNS and Cloud providers, or build in redundancy to mitigate risks should one suffer an outage.
  2. Prevent human error by engaging providers who have a stake in the Cloud. Free services could indicate little investment in the security of the free offering. Also consider using dedicated services or networks.
  3. Secure your online identifier to mitigate inter-network threats. Many cyberattacks begin with a phish—when a fraudster is able to take on your identity through a variety of means including DNS hijacking, and use legitimate email addresses for their phishing campaigns.

Listen to Alban’s keynote at Price Waterhouse Cooper’s HackaDay for his in-depth presentation on the topic.

By CSC, We are the business behind business

We help effectively manage, promote, and secure our clients’ valuable brand assets against the threats of the online world. Leading companies around the world choose CSC as their trusted partner to gain control of their digital assets, maximize their online potential, and increase online security against brand risks.

Visit Page

Filed Under

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Comments

Commenting is not available in this channel entry.

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC