{"id":70520,"date":"2023-08-17T11:40:14","date_gmt":"2023-08-17T03:40:14","guid":{"rendered":"https:\/\/version-2.com\/?p=70520"},"modified":"2023-08-14T11:43:05","modified_gmt":"2023-08-14T03:43:05","slug":"its-time-to-talk-about-cloud-security","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/08\/its-time-to-talk-about-cloud-security\/","title":{"rendered":"It\u2019s time to talk about cloud security"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"70520\" class=\"elementor elementor-70520\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/s1.npass.app\/nordpass\/media\/1.1842.0\/images\/web\/blog\/svg\/cloud-security-800x450.svg\" width=\"800\" height=\"450\" \/><\/p><div><p class=\"nord-text text-base leading-normal text-black text-lead leading-loose font-medium my-3\">Reading about the cloud in 2023 has an almost nostalgic feeling to it, a bit like watching that HBO special for the 20th anniversary of the Harry Potter series. You suddenly realize how long it\u2019s been since the whole conversation about cloud computing started.<\/p><p class=\"nord-text text-base leading-normal text-black\">The cloud has become such a common IT tool that today it is difficult to find an industry (or even a company) that does not use it to some extent. The chances are very high that you yourself are using it frequently.<\/p><p class=\"nord-text text-base leading-normal text-black\">So, we will not waste your time with generic information explaining the benefits and challenges of the cloud. Instead, we&#8217;ll get down to the nitty-gritty and <strong>discuss what\u2019s really important \u2014 cloud data security<\/strong>.<\/p><h2 id=\"first-things-first-what-is-cloud-security\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">First things first: What is cloud security?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Cloud data security could be explained as <strong>what organizations do to protect their cloud-based systems and applications \u2014 and the data they store in the cloud \u2014 against cyber threats<\/strong>.<\/p><p class=\"nord-text text-base leading-normal text-black\">You could also say that it is <strong>a set of strategies, procedures, and tools<\/strong> that, when properly applied, can help companies prevent unwanted data exposure or IT infrastructure damage caused by various internal or external factors.<\/p><p class=\"nord-text text-base leading-normal text-black\">Both explanations are correct. In fact, they complement each other and together provide more context \u2014 although they don&#8217;t give the whole picture.<\/p><p class=\"nord-text text-base leading-normal text-black\">Treating it more like a concept, we could say that cloud security is a complex and constantly evolving field in IT that <strong>requires attention from all organizations that have either fully or partially based their IT environment on the cloud<\/strong>. So, with that in mind, the question you may be asking yourself right now is\u2026<\/p><h2 id=\"why-is-cloud-security-so-important\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">Why is cloud security so important?<\/h2><p class=\"nord-text text-base leading-normal text-black\">If we had to answer that in one sentence, it would probably be this: <strong>cloud security plays an essential role in ensuring the confidentiality, integrity, and availability of sensitive data stored in the cloud<\/strong>. But this only scratches the surface. So, allow us to elaborate a bit because there\u2019s more to this matter than meets the eye.<\/p><p class=\"nord-text text-base leading-normal text-black\">Each year, more and more organizations start their digital transformation journeys and integrate cloud-based tools and services into their IT infrastructures. All of those companies \u2014 no matter if they are small businesses or large-scale enterprises \u2014 <strong>cannot afford to take any risks regarding the security of their digital assets<\/strong>.<\/p><p class=\"nord-text text-base leading-normal text-black\">This is why cloud security is one of the aspects that these companies must address if they decide to run even a tiny part of their activities in the cloud \u2014 or to keep their data inside one. If they don&#8217;t, they risk not only data loss or disruption of their business operations but also financial and reputational damage. They must be aware of the fact that keeping digital assets in the cloud doesn\u2019t mean that they are unreachable to hackers.<\/p><p class=\"nord-text text-base leading-normal text-black\">This is to say that organizations should make every effort to ensure that their cloud cybersecurity is at the highest level at all times \u2014 after all, the success of their business endeavors depends on that.<\/p><h2 id=\"main-risks-associated-with-cloud-security\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">Main risks associated with cloud security<\/h2><p class=\"nord-text text-base leading-normal text-black\">Security issues in cloud computing often revolve around the potential for unauthorized access \u2014 but not only that. Below, you will find descriptions of some of the biggest threats that today\u2019s companies must be aware of while developing their cloud security strategy. Whether a company will be able to address and manage these threats depends not only on the actions they take but also on its awareness of the emerging trends and disruptive forces shaping its industry.<\/p><ul class=\"leading-loose mt-3 mb-6 list--ul\"><li class=\"my-2\"><h3 id=\"data-breaches\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Data breaches:<\/h3><p class=\"nord-text text-base leading-normal text-black\">Whenever an organization starts storing sensitive information in the cloud, it instantly becomes a target for cybercriminals \u2014 and they will try to find their way in. A successful breach could result in the <strong>exposure of the company\u2019s confidential data including its financial records, customers\u2019 personal information, or even intellectual property<\/strong>.<\/p><p class=\"nord-text text-base leading-normal text-black\">In its <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cCost of a data breach\u201d report<\/a>, IBM reveals that the global <strong>average cost of a data breach across all sectors in 2023 is almost $4.5 million<\/strong> \u2014 which is an amount that has increased by almost 15% over the last three years. This fact alone shows that companies cannot waste time, and they should introduce robust authentication mechanisms, encryption protocols, and access controls as soon as possible to protect themselves against this threat.<\/p><\/li><li class=\"my-2\"><h3 id=\"insider-threats-and-privilege-abuse\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Insider threats and privilege abuse:<\/h3><p class=\"nord-text text-base leading-normal text-black\">It should be no surprise to anyone that employees with access to company data sometimes misuse their privileges or can be coerced into revealing sensitive information. This can lead to similar or even the same issues that arise due to data breaches.<\/p><p class=\"nord-text text-base leading-normal text-black\"><strong>Hackers will use every vulnerability in security controls or protocols to gain unauthorized access<\/strong> to your systems and applications \u2014 and that is why companies must work on developing sound cybersecurity policies that, first, their employees will adhere to, and second, will help them mitigate the damage if one of their employees (whether intentionally or not) causes a potential cybersecurity threat.<\/p><\/li><li class=\"my-2\"><h3 id=\"insufficient-compliance-with-legal-requirements\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Insufficient compliance with legal requirements:<\/h3><p class=\"nord-text text-base leading-normal text-black\">Cloud service providers often operate on a global scale, helping customers from different parts of the world where different sets of data protection laws and regulations apply. It\u2019s no rocket science to point out that complying with these diverse legal requirements can be a challenge for both cloud providers and their customers.<\/p><p class=\"nord-text text-base leading-normal text-black\">Non-compliance with the standards may lead to serious financial or reputational losses. Thus, businesses must <strong>carefully navigate the regulatory landscape and choose cloud providers that meet the relevant criteria<\/strong>.<\/p><\/li><\/ul><h3 id=\"best-practices-in-cloud-security\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Best practices in cloud security<\/h3><p class=\"nord-text text-base leading-normal text-black\">Before we discuss any cloud security best practices, we would like to point out that cloud security as a whole is a <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/cybersecurity-more-than-it-issue\/\">continuous process<\/a> and, therefore, <strong>you should stay informed about the latest security trends and practices so that you can protect your cloud environment more effectively<\/strong>. In other words, do not think of the following examples as the only elements you should pay attention to when creating a cloud security strategy. Instead, treat them as a starting point.<\/p><ol class=\"leading-loose mt-3 mb-6 list--ol\"><li class=\"my-2\"><p class=\"nord-text text-base leading-normal text-black\"><strong>Encrypt your data<\/strong>: One of the foundational pillars of cloud security is encryption, which is the process of using combinations of sophisticated algorithms to make sure that no unauthorized party can access your data \u2014 whether at rest or in transit. Some cloud service providers offer built-in encryption features, which you can leverage to keep your data secure at all times. If they are not available to you from the get-go, consider using third-party encryption tools to protect your sensitive information.<\/p><\/li><li class=\"my-2\"><p class=\"nord-text text-base leading-normal text-black\"><strong>Implement and use identity and access management (IAM) tools<\/strong>: To manage user access and permissions effectively, you must implement a strong IAM strategy. For example, by following the principle of least privilege, you can ensure that only authorized users with specific roles can access your systems, applications, and data. In other words, you can use IAM tools to provide the right people with access to the right resources \u2014 and only them. This will help you protect sensitive information from being compromised.<\/p><\/li><li class=\"my-2\"><p class=\"nord-text text-base leading-normal text-black\"><strong>Carry out audits regularly and monitor all cloud activities<\/strong>: You can stay ahead of potential security risks if you conduct frequent security audits. That way, you will be able to identify cybersecurity areas that require improvement and take necessary measures to address them before any security breach occurs. If you pay close attention to what&#8217;s going on in your network, you&#8217;ll be able to detect and respond to any anomalies or potential threats before they cause damage.<\/p><\/li><li class=\"my-2\"><p class=\"nord-text text-base leading-normal text-black\"><strong>Find out what your provider does to ensure cloud security<\/strong>: When teaming up with a cloud service provider, you should take the time to understand their shared responsibility model and all the security features they offer. In other words, you should get familiar with your provider\u2019s security practices and security to, first, double-check if their approach aligns with your organization&#8217;s specific security requirements, and second, to ensure that your sensitive data and applications are adequately protected in the cloud environment.<\/p><\/li><li class=\"my-2\"><p class=\"nord-text text-base leading-normal text-black\"><strong>Backup your data<\/strong>: You can enhance your organization&#8217;s cybersecurity by consistently backing up your business data in a highly secure location and rigorously testing the recovery process. If you take this proactive approach, you will be able to, in the unfortunate event of a security breach or data loss, quickly and seamlessly restore crucial data and applications. Not to mention that it will help you minimize downtime, safeguard your reputation, and ensure business continuity.<\/p><\/li><\/ol><h2 id=\"how-does-nordlocker-fit-into-the-context-of-cloud-security\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">How does NordLocker fit into the context of cloud security?<\/h2><p class=\"nord-text text-base leading-normal text-black\">To adequately answer this question, we need to start with a brief explanation of what <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/nordlocker.com\/business-cloud-storage\/\" target=\"_blank\" rel=\"noopener noreferrer\">NordLocker<\/a> is, namely <strong>an end-to-end encrypted cloud storage platform<\/strong> that allows you to securely store, manage, and share your business data with company members and partners.<\/p><p class=\"nord-text text-base leading-normal text-black\">NordLocker was designed to help companies \u2014 no matter the size, location, and nature of their business \u2014 protect their digital assets in a highly secure, state-of-the-art cloud environment to which only they have access. Therefore, it is more than fair to say that NordLocker was created with cloud security in mind.<\/p><p class=\"nord-text text-base leading-normal text-black\">Thanks to its wide range of features \u2014 <strong>from end-to-end encryption, through multi-factor authentication (MFA), to zero-knowledge architecture (and everything in between)<\/strong> \u2014 NordLocker covers all the cybersecurity practices we discussed in this article to help its users create a much safer online business environment. It can help you do that as well.<\/p><p class=\"nord-text text-base leading-normal text-black\">That\u2019s why we encourage you to go to NordLocker and learn more about the platform and get a 14-day free trial. That way, you will be able to see for yourself if NordLocker is the right fit for your business and if what we\u2019re saying is true.<\/p><p class=\"nord-text text-base leading-normal text-black\">Enjoy the ride!<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Reading about the cloud in 2023 has an almost nostalgic [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1129,61],"tags":[974,1076,1131],"class_list":["post-70520","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordpass","category-press-release","tag-nord-security","tag-1076","tag-nordpass"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>It\u2019s time to talk about cloud security - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It\u2019s time to talk about cloud security - Version 2\" \/>\n<meta property=\"og:description\" content=\"Reading about the cloud in 2023 has an almost nostalgic [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-17T03:40:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s1.npass.app\/nordpass\/media\/1.1842.0\/images\/web\/blog\/svg\/cloud-security-800x450.svg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cloud-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/08\\\/its-time-to-talk-about-cloud-security\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"It\u2019s time to talk about cloud security\",\"datePublished\":\"2023-08-17T03:40:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/08\\\/its-time-to-talk-about-cloud-security\\\/\"},\"wordCount\":1597,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cloud-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s1.npass.app\\\/nordpass\\\/media\\\/1.1842.0\\\/images\\\/web\\\/blog\\\/svg\\\/cloud-security-800x450.svg\",\"keywords\":[\"Nord Security\",\"2023\",\"NordPass\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/08\\\/its-time-to-talk-about-cloud-security\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cloud-security\\\/\",\"name\":\"It\u2019s time to talk about cloud security - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cloud-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cloud-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s1.npass.app\\\/nordpass\\\/media\\\/1.1842.0\\\/images\\\/web\\\/blog\\\/svg\\\/cloud-security-800x450.svg\",\"datePublished\":\"2023-08-17T03:40:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cloud-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/cloud-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cloud-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/s1.npass.app\\\/nordpass\\\/media\\\/1.1842.0\\\/images\\\/web\\\/blog\\\/svg\\\/cloud-security-800x450.svg\",\"contentUrl\":\"https:\\\/\\\/s1.npass.app\\\/nordpass\\\/media\\\/1.1842.0\\\/images\\\/web\\\/blog\\\/svg\\\/cloud-security-800x450.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cloud-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"It\u2019s time to talk about cloud security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"It\u2019s time to talk about cloud security - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"It\u2019s time to talk about cloud security - Version 2","og_description":"Reading about the cloud in 2023 has an almost nostalgic [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/cloud-security\/","og_site_name":"Version 2","article_published_time":"2023-08-17T03:40:14+00:00","og_image":[{"url":"https:\/\/s1.npass.app\/nordpass\/media\/1.1842.0\/images\/web\/blog\/svg\/cloud-security-800x450.svg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/cloud-security\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/08\/its-time-to-talk-about-cloud-security\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"It\u2019s time to talk about cloud security","datePublished":"2023-08-17T03:40:14+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/08\/its-time-to-talk-about-cloud-security\/"},"wordCount":1597,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/s1.npass.app\/nordpass\/media\/1.1842.0\/images\/web\/blog\/svg\/cloud-security-800x450.svg","keywords":["Nord Security","2023","NordPass"],"articleSection":["Nord Security","2023","NordPass","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/08\/its-time-to-talk-about-cloud-security\/","url":"https:\/\/nordpass.com\/blog\/cloud-security\/","name":"It\u2019s time to talk about cloud security - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/s1.npass.app\/nordpass\/media\/1.1842.0\/images\/web\/blog\/svg\/cloud-security-800x450.svg","datePublished":"2023-08-17T03:40:14+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/cloud-security\/#primaryimage","url":"https:\/\/s1.npass.app\/nordpass\/media\/1.1842.0\/images\/web\/blog\/svg\/cloud-security-800x450.svg","contentUrl":"https:\/\/s1.npass.app\/nordpass\/media\/1.1842.0\/images\/web\/blog\/svg\/cloud-security-800x450.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"It\u2019s time to talk about cloud security"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ilq","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/70520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=70520"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/70520\/revisions"}],"predecessor-version":[{"id":70527,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/70520\/revisions\/70527"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=70520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=70520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=70520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}