800-611-2884
**COVID-19 Response**   |   MORE Maximo Community   |   Customer Support   |   Contact Us   |   800-611-2884

Stop maintaining the thing that maintains your maintenance. Learn how Projetech can assist you with Maximo so you can focus on innovating, not upgrading | Request a Quote

Emerging Cloud Security Threats

Date:

October 28, 2019

Author:

Troy Elsen, Director of Cloud Infrastructure Operations

Weak Identity and Access Management Controls

  • Identity and access management (IAM) controls are about securely managing the user account life cycle across one or many organizations. Least access principles should always be followed.
  • Administrative controls such as policies and procedures surrounding authentication and authorization should be in place to ensure industry best practice is followed.
  • Technical controls such as a third-party application that allows for centralized management and integrates with company user directories.  

Cloud provider's role in security

  • As more and more companies take their business to the cloud, there is often a blurred line regarding security roles and responsibilities.
  • Companies and cloud providers must ensure all layers of the company solution are identified and protected by one or both parties. These areas of responsibilities should be addressed during the contractual phase of the service agreement.  

IoT Security

  • The Internet of Things (IoT) continues to grow with technology. Things such as baby monitors, coffee makers, security systems and even cars are now connected to the internet.
  • Reviewing basic security requirements such as default account settings and password reset, encryption, web interface security can help prevent malicious activity.

Account Hijacking

  • Businesses will continue to increase public web transactions and increase the risk of compromise.
  • Cloud applications should have strong authentication methods and use multi-factor authentication whenever possible. Sensitive data should be encrypted in-transit and at-rest. Context-based access controls such as time of day or source location can also be used to improve account security.

Request a Quote

At Projetech, we work with your company to customize a solution that meets your business goals and unique business needs while still fitting into your budget.

Request Quote

Success Stories

Don't take our word for it. Hear from some of our best clients and their own experience moving to the Projetech Cloud.

Learn More
Stay up to date on all the latest tips and tricks from Projetech: Click Here

Keep Reading

Projetech is Officially ISO 27001 Certified

Projetech takes threats to the availability, integrity, and confidentiality of its clients' information seriously. As such, Projetech is an ISO/IEC 27001:2013 certified provider whose Information Security Management System (ISMS) has received third-party accreditation from the International Standards Organization.

Continue Reading

End of Year Processing Reminders for Maximo

End of the Year Processing Reminders for Maximo. Maximo has a number of year to date buckets that need to be reset. Let's take a look in Maximo.

Continue Reading

Check out our Webinars

Augmented Reality (AR) – The new “must have” solution for maintenance

Watch the Recording

Top Tips for Maximo Administrators

Watch the Recording

3 Real World Starting Points to Reimagine Maximo by Simplifying IoT and AR Solution

Watch the Recording

Start Center Design Basics – Roles & Performance

Watch the Recording

Join the Network of Maximo Experts

Sign up below to receive all the best Maximo content from us and our solution providers.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.