{"id":30428,"date":"2021-03-19T15:55:35","date_gmt":"2021-03-19T07:55:35","guid":{"rendered":"https:\/\/version-2.com\/?p=30428"},"modified":"2021-06-16T15:41:05","modified_gmt":"2021-06-16T07:41:05","slug":"risk-associated-with-the-lack-of-protection-in-cloud-access","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/","title":{"rendered":"Risk associated with the lack of protection in Cloud access"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"30428\" class=\"elementor elementor-30428\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e post-content elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading post-slideshow fusion-post-slideshow\"><div class=\"fusion-flexslider flexslider fusion-flexslider-loading post-slideshow fusion-post-slideshow\"><div class=\"fusion-flexslider flexslider fusion-flexslider-loading post-slideshow fusion-post-slideshow\"><p><a title=\"\" href=\"https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3.png\" data-rel=\"iLightbox[gallery24783]\" data-title=\"Layout-Capa -Blog- senhasegura [Recuperado]-01\" data-caption=\"\" aria-label=\"Layout-Capa -Blog- senhasegura [Recuperado]-01\"><img fetchpriority=\"high\" decoding=\"async\" class=\"attachment-full size-full wp-post-image\" src=\"https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3.png\" sizes=\"(max-width: 800px) 100vw, 984px\" srcset=\"https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3-200x81.png 200w, https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3-400x163.png 400w, https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3-600x244.png 600w, https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3-800x325.png 800w, https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3.png 984w\" alt=\"\" width=\"984\" height=\"400\" \/><\/a><\/p><\/div><div class=\"post-content\"><p>The<a href=\"https:\/\/senhasegura.com\/blog\/melhores-praticas-ambiente-cloud\/\">\u00a0cloud<\/a>\u00a0concept is less and less a buzzword and more of a need. Everyone, from application developers, executives, and students, is benefiting from the flexibility and reliability of cloud-based solutions.<\/p><p>Although the cloud has evolved a lot in recent years, there are still risks involved. One of the main concerns of<a href=\"https:\/\/senhasegura.com\/blog\/ciberseguranca-o-custo-de-ameacas-internas-de-uma-empresa\/\">\u00a0cybersecurity<\/a>\u00a0professionals is the protection of access in cloud environments.<\/p><p>The cloud hosts data for thousands and thousands of people \u2013 including third parties, employees, and customers \u2013 which increases the attack surface. A successful attack can be fatal for many companies, and directly affect business continuity.<\/p><p>In this article, we explore some of the main risks associated with the lack of protection in cloud access. Also, we explain how some basic actions can be strategic to mitigate the risks of lack of management and<a href=\"https:\/\/senhasegura.com\/blog\/9-funcionalidades-boas-praticas-pam\/\">\u00a0access protection<\/a>\u00a0in cloud environments.<\/p><p>With a little planning, you can effectively mitigate these risks and take advantage of all that the constantly evolving cloud has to offer. Keep reading on and find out what risks you are exposed to due to the lack of protection for cloud accesses.<\/p><h2 class=\"fusion-responsive-typography-calculated\" data-fontsize=\"30\" data-lineheight=\"45px\"><b>Lack of Governance<\/b><\/h2><p>Do you have control of the data in your cloud environment? Do you know what information your employees have access to? Do outsourced employees have limited and controlled access to your cloud? The answers to these questions indicate whether your organization has good governance in the cloud or not.<\/p><p>Cloud governance ensures that all actions, from the implementation of a new server to the interactions of systems and data security, are properly managed.<\/p><p>The move from local infrastructures in companies to cloud environments adds layers of complexity to the protection of systems. It also means that more people in your company have the potential to impact these systems. That is why it is essential to develop and maintain a<a href=\"https:\/\/senhasegura.com\/blog\/compliance-do-devops\/\">\u00a0cloud governance<\/a>\u00a0model for access management.<\/p><p>By designating who has access to each part of the asset, information, and system management, your governance plan will determine the necessary limits on who can access and impact your infrastructure.<\/p><p>As mentioned earlier, this is especially important considering how easy it is to deploy new servers and other assets in the cloud. The last thing you want is applications and IT initiatives that are not properly managed, impacting your systems architecture and negatively impacting customers and users.<\/p><p>\u00a0Controlling access to your cloud\u2019s critical assets is essential for a more reliable environment, especially if you outsource software development to other companies.<\/p><h2 class=\"fusion-responsive-typography-calculated\" data-fontsize=\"30\" data-lineheight=\"45px\"><b>Data Breaches<\/b><\/h2><p>Data breaches are a major cybersecurity concern as the amount of data transmitted over the internet has been growing exponentially. This continuous transfer of information makes it possible for attackers anywhere to attempt to breach data in almost any company they choose.<\/p><p>What are the main ways in which a<a href=\"https:\/\/senhasegura.com\/blog\/a-importancia-da-protecao-de-dados-pessoais\/\">\u00a0data breach<\/a>\u00a0can occur? The simplest way to view private data is to steal someone else\u2019s login credentials to enter a system.<\/p><p>To that end, attackers apply a series of strategies to get their hands on the logins and passwords of a company\u2019s employees. This is a big risk associated with the lack of access protection in your cloud because even less-skilled attackers can easily access your company\u2019s data.<\/p><p>Internal threats are also a form of a data breach. These threats involve employees who have access to protected information, deliberately exposing that data, often for personal gain. In that sense, when there is no proper access control to manage what employees and outsourced people do in the cloud environment, this threat can become real.<\/p><p><a href=\"https:\/\/senhasegura.com\/blog\/importancia-controle-acesso-rbac\/\">Access control<\/a>\u00a0is a way to minimize risks associated with data breaches, ensuring that your employees have only the minimum access and permissions necessary to do their job.<\/p><h2 class=\"fusion-responsive-typography-calculated\" data-fontsize=\"30\" data-lineheight=\"45px\"><b>Non-Compliance With Market Laws and Regulations<\/b><\/h2><p>New laws such as the<a href=\"https:\/\/senhasegura.com\/blog\/como-adequar-lgpd\/\">\u00a0LGPD<\/a>\u00a0(General Data Protection Law) are increasingly demanding the development of a series of procedures for data protection from Brazilian companies. The law should be applied to any organization that performs operations with personal data, such as the collection, transmission, storage, or processing of data from Brazilians\u2026<\/p><p>If your company fits into this segment, it is important to understand how access protection failures in your cloud environment can negatively affect business.<\/p><p>In cases where a breach of personal data occurs and if your company has not taken the required basic protection measures, you may suffer penalties, such as regulatory fines from the LGPD, which can reach 2% of revenues or R$ 50 million reais. Also, when it comes to cloud environments, you need to know where your cloud provider is located.<\/p><p>As an example, if your provider is located in any region of Europe, you should also seek compliance with the<a href=\"https:\/\/senhasegura.com\/blog\/pontos-importantes-lgpd-e-a-gdpr\/\">\u00a0GDPR<\/a>\u00a0(General Data Protection Regulation) in order not to suffer penalties.<\/p><p>Meanwhile, in the payment methods market, certifications such as the PCI DSS (Payment Card Industry Data Security Standard) determine the importance of<a href=\"https:\/\/senhasegura.com\/blog\/acessos-privilegiados-efetivo\/\">\u00a0access control and management<\/a>\u00a0for cloud environments and define strong security policies for protecting customers.<\/p><p>Another example of regulation required by the payment methods market is Bacen\u2019s<a href=\"https:\/\/senhasegura.com\/blog\/o-que-eu-preciso-saber-sobre-a-resolucao-do-bacen\/\">\u00a0Resolution 4658<\/a>. The resolution is meant to guide procedures and controls to reduce cyber vulnerabilities and meet cybersecurity goals in cloud environments. Not complying is not an option for businesses.<\/p><h2 class=\"fusion-responsive-typography-calculated\" data-fontsize=\"30\" data-lineheight=\"45px\"><b>Your Company and Your Customers at Risk<\/b><\/h2><p>Cloud providers can guarantee compliance for their infrastructure and environment, but compliance with<a href=\"https:\/\/senhasegura.com\/blog\/frameworks-pam\/\">\u00a0security and risk mitigation requirements<\/a>\u00a0is still entirely your responsibility.<\/p><p>We have already discussed access risks in cloud environments, so it is important to remember what is at risk. A breach of your data or your customer\u2019s data can be devastating, depending on the type of data and the breach extent.<\/p><p>The costs of investigating and resolving a breach, associated legal expenses, and losses to a company\u2019s reputation can be enough to make its business unfeasible.<\/p><p><a href=\"https:\/\/senhasegura.com\/seguranca-e-gestao-de-risco\/seguranca-de-cloud\/\">senhasegura<\/a>\u00a0can help your company control risks in the cloud:<\/p><ul><li>Fully integrating and implementing two layers of privileged account security: for both the service provider and the customers.<\/li><li>Reinforcing administrative access to virtual machines.<\/li><li>Incorporating senhasegura into task automation tools to transparently provision new accounts via APIs.<\/li><li>Systematically resetting standard passwords as part of the provisioning process.<\/li><li>Providing individual responsibility for all privileged user activities.<\/li><li>Isolating, monitoring, and recording all sessions.<\/li><li>Replacing encrypted and visible application credentials with rotating credentials to improve security.<\/li><\/ul><p>Request a demo now and discover the benefits of senhasegura for your business.<a href=\"https:\/\/senhasegura.com\/demonstracao\/\">\u00a0Request it here<\/a>.<\/p><p>Are the risks of lack of access protection in cloud environments worth it? It is up to you to decide.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The\u00a0cloud\u00a0concept is less and less a buzzword and more  [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,461,61],"tags":[420,462],"class_list":["post-30428","post","type-post","status-publish","format-standard","hentry","category-segura","category-year2021","category-press-release","tag-segura","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Risk associated with the lack of protection in Cloud access - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/zh\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk associated with the lack of protection in Cloud access - Version 2\" \/>\n<meta property=\"og:description\" content=\"The\u00a0cloud\u00a0concept is less and less a buzzword and more [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/zh\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-19T07:55:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-16T07:41:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Risk associated with the lack of protection in Cloud access\",\"datePublished\":\"2021-03-19T07:55:35+00:00\",\"dateModified\":\"2021-06-16T07:41:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/\"},\"wordCount\":1102,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/03\\\/layout-capa-blog-senhasegura-recuperado-01-3.png\",\"keywords\":[\"Segura\",\"2021\"],\"articleSection\":[\"Segura\",\"2021\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/\",\"name\":\"Risk associated with the lack of protection in Cloud access - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/03\\\/layout-capa-blog-senhasegura-recuperado-01-3.png\",\"datePublished\":\"2021-03-19T07:55:35+00:00\",\"dateModified\":\"2021-06-16T07:41:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/03\\\/layout-capa-blog-senhasegura-recuperado-01-3.png\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/03\\\/layout-capa-blog-senhasegura-recuperado-01-3.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/risk-associated-with-the-lack-of-protection-in-cloud-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk associated with the lack of protection in Cloud access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risk associated with the lack of protection in Cloud access - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/zh\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/","og_locale":"zh_HK","og_type":"article","og_title":"Risk associated with the lack of protection in Cloud access - Version 2","og_description":"The\u00a0cloud\u00a0concept is less and less a buzzword and more [&hellip;]","og_url":"https:\/\/version-2.com\/zh\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/","og_site_name":"Version 2","article_published_time":"2021-03-19T07:55:35+00:00","article_modified_time":"2021-06-16T07:41:05+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Risk associated with the lack of protection in Cloud access","datePublished":"2021-03-19T07:55:35+00:00","dateModified":"2021-06-16T07:41:05+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/"},"wordCount":1102,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3.png","keywords":["Segura","2021"],"articleSection":["Segura","2021","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/","url":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/","name":"Risk associated with the lack of protection in Cloud access - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3.png","datePublished":"2021-03-19T07:55:35+00:00","dateModified":"2021-06-16T07:41:05+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/#primaryimage","url":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3.png","contentUrl":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/03\/layout-capa-blog-senhasegura-recuperado-01-3.png"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2021\/03\/risk-associated-with-the-lack-of-protection-in-cloud-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Risk associated with the lack of protection in Cloud access"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-7UM","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/30428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=30428"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/30428\/revisions"}],"predecessor-version":[{"id":30432,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/30428\/revisions\/30432"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=30428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=30428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=30428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}