Dalin Owen
  • Blog
  • About
  • Blog
  • About

Securing Cloud-Based Systems

9/29/2025

 
Picture
​Cloud-based systems have changed how organizations store, manage, and access data. Unlike traditional storage methods, cloud-based systems provide scalability, cost efficiency, and flexibility. However, as organizations continue to upload critical and sensitive information to the cloud, they must secure it to prevent data breaches.

Cybercriminals and threat actors continue targeting cloud-based data. Threats such as data breaches, unauthorized access, misconfigured services, and ransomware attacks can hurt an organization’s reputation, operations, and finances. Securing cloud environments involves a combination of policies, vigilant monitoring, and advanced security technologies. The implementation and understanding of best practices for securing cloud-based systems maximize the benefits of adopting cloud solutions without compromising safety.

First, organizations must define and enforce efficient cloud security policies by creating well-documented security polices that all executives, management, and staff will follow. These policies should outline acceptable use of cloud services and solutions. The policies should also describe data classification and administration, assigned access, roles, resources, and the step-by-step approach to handling a security breach.

By clearly establishing these policies and rules, companies can reduce the risk of shadow IT, a situation in which employees use unauthorized and insecure applications and systems. Tools like cloud security posture management (CSPM) systems and cloud access security brokers (CASB) help enforce these policies and monitor the cloud environment in real-time, ensuring compliance with established rules and regulations.

Identity management protects user accounts from unauthorized access in cloud environments through strong identity and access management (IAM) practices, which safeguard the cloud system. For instance, organizations must implement multi-factor authentication (MFA) on all accounts, particularly those with high-level permissions. Phishing-resistant MFA methods, such as physical hardware tokens or WebAuthn (web authentication), often provide stronger protection. Phishing is a cyberattack where attackers deceive individuals into revealing sensitive information, such as passwords or credit card details, by pretending to be a trustworthy entity. Role-based access control, or RBAC, which involves granting authorization based on an individual’s role, can also help protect data in the cloud from unauthorized user access.

Organizations must encrypt sensitive information to protect it from unauthorized access during storage and transmission over the network. They can use modern encryption standards, such as AES-256, for storing data, and TLS 1.3 for transmitting data. Modern encryption standards help store decryption keys securely, preferably in hardware security modules or through dedicated key management services that keep data unreadable and secure in the event of a breach.

Adopting a zero-trust architecture means never assuming anything inside the network is automatically safe. Every user, device, and application must go through continuous authentication and authorization. By using micro-segmentation and robust identity verification, organizations can restrict lateral movement and mitigate the impact of attacks.

Endpoint security plays a crucial role in protecting business operations. Laptops, mobile devices, and other endpoints should run on advanced protection platforms, receive regular patches, and connect to cloud services only through secure VPN access. Combining these protections with firewalls, network segmentation, and private connections helps block unauthorized access and keep data safe.

Further, organizations can align practices with recognized international standards. They can adopt frameworks such as ISO/IEC 27017, which focuses on cloud-specific security controls, and ISO/IEC 27018, which addresses the protection of personal data in public clouds. By following these standards, companies enhance their security posture, meet regulatory requirements, and build trust through adherence to globally recognized best practices.

Finally, cloud security requires safeguarding information by preparing for data loss or corruption. Organizations can use immutable backup storage to prevent the alteration and deletion of backups during ransomware attacks. They can also test recovery procedures to ensure the swift restoration of systems in the event of a disruption.

Reading Fiction vs Non Fiction

5/19/2025

0 Comments

 
Picture
​Researchers have documented and shared the benefits of reading for several years. It keeps the mind sharp and enhances vocabulary and communication skills. However, they have not decided if reading fiction or non-fiction benefits individuals more. Nonetheless, both remain beneficial.

Fiction refers to a creative piece based on imaginary events, plots, and characters. Many authors of fiction genres, such as mystery or thriller, science fiction or fantasy, and romance, aim to entertain their audiences. Others, like historical fiction and literary fiction, incorporate provoking narratives, plots, and complex characters that do more than entertain.

Non-fiction authors base their works on facts, real events, and real people, which informs and educates the reader. Non-fiction genres include biographies or memoirs, self-help or educational, science and history, and travel and culture.

In addition, fiction differs from non-fiction writing in that it focuses on creative prose to describe a setting or bring a character to life, stimulating the reader’s imagination. Non-fiction writing uses straight-to-the-point prose.

Reading fiction also differs from reading non-fiction. Some find that reading fiction demands less brainpower as it focuses on inspiring the imagination. Non-fiction engages the analytical side of the brain and may incorporate data, theories, ideas, and accounts to interrogate.

As such, fiction has become a stress-relieving activity for some readers. Reading fiction allows them to escape the realities of their everyday lives and into the writer's world. It invites the reader to dream, to lose themselves in imaginary worlds, and to forget all their worries, if only momentarily. 

Next, fiction cultivates empathy. It invites the reader to put themselves in the shoes of the different characters. Some characters reflect the reader. They help the reader understand themselves and their flaws or other people. Fiction explores complex human situations and social issues in a non-accusatory manner, serving as a safe space where the reader can navigate challenging situations. For example, Fyodor Dostoevsky’s Crime and Punishment explores the full range of the human condition, giving the reader insight into the complex emotional and psychological states that drive people to act in a certain way.

Meanwhile, reading a biography of people who beat the odds, like Andrew Carnegie, Henry Ford, and John D. Rockefeller, can inspire the reader. Like Malcolm Gladwell’s Outliers, self-help books inspire and offer practical lessons.

Works of non-fiction invite the reader on a journey of introspection and self-discovery. Just as a fiction reader might see themselves in a particular character, a non-fiction reader might find aspects that reflect his or hers in a memoir.

Neither fiction nor non-fiction is superior. They appeal to different types of readers. Fiction’s beautiful prose appeals to the creative and imaginative thinker. On the other hand, real-world stories tend to interest readers who see themselves as pragmatic. Sometimes what one reads comes down to the mood or time. For example, fiction can be ideal around bedtime.

People read for varied reasons, which might be the reason behind the fiction vs. non-fiction clash. Some read for nuggets of wisdom and practical lessons they can apply in their lives. Others read for reading’s sake.

Dalin Owen

Shop
0 Comments

Advantages of Outsourcing IT Security

4/28/2025

0 Comments

 
Picture
​Cyber threats continue advancing daily. Therefore, organizations must invest to counter them. They can use several strategies to obtain the expertise needed to protect their infrastructure, such as hiring third parties and outsourcing the tasks.

Outsourcing IT security can take three forms. Firms can hire third parties that handle all their IT security. Option two is the hybrid approach, allowing organizations to enjoy the best of outsourcing and in-house IT security while reducing the risks associated with each. The third option is to bring in an IT security expert to consult on an as-needed basis.

Moreover, outsourcing IT support provides firms access to experts at a fixed cost. IT security refers to a broad field with several interconnected subfields, such as security architecture, application security, network security, and data loss prevention. Some organizations benefit from hiring an on-site team that stays abreast of the new threats. However, others cannot afford an internal team of trained experts.

Firms that outsource IT tasks find that it makes the service cost-effective. The IT contractors purchase and maintain their security tools. It offers firms access to advanced technology and infrastructure at a fraction of the cost. Also, most managed service providers (MSPs) have packages that allow firms to choose the services they need.

MSPs can set up their operations quickly. Building an IT department from the group up becomes an uphill task for smaller firms.

Since technology concerns have a broad and complex reach, they can distract firms, diverting their attention, resources, and time away from core business functions. Outsourcing frees up leadership to focus on strategic functions. It enhances productivity and reduces downtime.

Nonetheless, outsourcing poses unique challenges. MSPs serve several clients simultaneously. Therefore, some may not offer customized solutions, a downside for niche businesses that require tailored services. Sometimes, it means that IT clients do not receive timely solutions.

Next, organizations must integrate the tools offered by the contractors. It requires time to set it up and train staff. Therefore, when outsourcing, partner with companies MSPs specializing in a particular industry. It ensures that organizations pay for the services that they use and require, which may also address any integration challenges.

An in-house IT security team offers control. Building an on-site team ensures that the department tailors its solutions to the organization. Having an in-house IT security team also means greater control of processes and a deeper understanding of security challenges. This allows firms to build bespoke security strategies. It also speeds up threat resolution and makes collaboration seamless.

However, in-house IT security also presents challenges. Organizations must explore the cost of the department, including salaries, ongoing training, and benefits, which helps retain top talent.

Cyberattacks typically happen after hours and on weekends. For this reason, IT security becomes a 24/7 operation. Thus, IT professionals must make themselves available around the clock and remain on call, which demands significant resources.

Finally, some MSPs have introduced a hybrid system, allowing firms to retain some IT security tasks and outsource others, like 24/7 monitoring and threat detection. The hybrid approach offers increased flexibility. It also allows you to scale without giving up oversight. It also means you can outsource expensive security measures while reducing exposure by retaining those linked to sensitive data.
0 Comments

    Author

    Dalin Owen - Guiding an IT Consultancy Firm

    Archives

    No Archives

    Categories

    All

    RSS Feed

Powered by Create your own unique website with customizable templates.