800-611-2884
**COVID-19 Response**   |   Free Trial   |   Customer Support   |   Contact Us   |   800-611-2884

Emerging Cloud Security Threats

Date:

October 28, 2019

Author:

Troy Elsen, Director of Cloud Infrastructure Operations

Weak Identity and Access Management Controls

  • Identity and access management (IAM) controls are about securely managing the user account life cycle across one or many organizations. Least access principles should always be followed.
  • Administrative controls such as policies and procedures surrounding authentication and authorization should be in place to ensure industry best practice is followed.
  • Technical controls such as a third-party application that allows for centralized management and integrates with company user directories.  

Cloud provider's role in security

  • As more and more companies take their business to the cloud, there is often a blurred line regarding security roles and responsibilities.
  • Companies and cloud providers must ensure all layers of the company solution are identified and protected by one or both parties. These areas of responsibilities should be addressed during the contractual phase of the service agreement.  

IoT Security

  • The Internet of Things (IoT) continues to grow with technology. Things such as baby monitors, coffee makers, security systems and even cars are now connected to the internet.
  • Reviewing basic security requirements such as default account settings and password reset, encryption, web interface security can help prevent malicious activity.

Account Hijacking

  • Businesses will continue to increase public web transactions and increase the risk of compromise.
  • Cloud applications should have strong authentication methods and use multi-factor authentication whenever possible. Sensitive data should be encrypted in-transit and at-rest. Context-based access controls such as time of day or source location can also be used to improve account security.

Request a Quote

At Projetech, we work with your company to customize a solution that meets your business goals and unique business needs while still fitting into your budget.

Request Quote

Success Stories

Don't take our word for it. Hear from some of our best clients and their own experience moving to the Projetech Cloud.

Learn More
Stay up to date on all the latest tips and tricks from Projetech: Click Here

Keep Reading

Data Protection in the Cloud

Data protection is vital to our core business and the continued success of customer growth. At a very basic level, it is important to point out how we protect customers’ data. There are many different approaches to protecting data in the cloud, but some of the most vital are backup, disaster recovery, business continuity,contingency planning.

Continue Reading

Hidden Maximo Functionality: Work Order Tracking

How do you find material usage or labor transactions to find work order records based on that information? Simply do so by utilizing the relationship in place and modifying the application through the application designer to make the additional fields available to query.

Continue Reading

Check out our Webinars

1,000,000 Rides Later: SMART's Journey to Cloud Based Maximo

Watch the Recording

Download & Go: Simple Mobile Solutions for Maximo

Watch the Recording

Automatically Replicate Your Maximo Data

Watch the Recording

Maximo Start Centers & Their Portlets

Watch the Recording

Join the Network of Maximo Experts

Sign up below to receive all the best Maximo content from us and our solution providers.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.