Is the Cloud Secure Enough?
More and more people are trusting the cloud with their data, but experience shows that they're more likely to have that data stolen after moving to the cloud than they were before.
With the number of cloud data breaches escalating, we ask the question: Is the Cloud Secure Enough?
💬 Follow Me
https://twitter.com/AndrewMRQuinn
The Pro Tech Show provides tech, tips, and advice for IT Pros and decision-makers.
Video timestamps:
0:00 - Introduction
0:34 - Not All Clouds Are Equal
1:35 - Ask about Security
2:27 - What the Big Boys Are Doing
2:55 - Case Study: Office 365
5:13 - Shared Security Model
6:51 - But I Haven't Been Breached
7:45 - Phishing Example
9:53 - Should You Stay On-Premises?
10:52 - Closing Thoughts
#CyberSecurity #Cloud
Видео Is the Cloud Secure Enough? канала Pro Tech Show
With the number of cloud data breaches escalating, we ask the question: Is the Cloud Secure Enough?
💬 Follow Me
https://twitter.com/AndrewMRQuinn
The Pro Tech Show provides tech, tips, and advice for IT Pros and decision-makers.
Video timestamps:
0:00 - Introduction
0:34 - Not All Clouds Are Equal
1:35 - Ask about Security
2:27 - What the Big Boys Are Doing
2:55 - Case Study: Office 365
5:13 - Shared Security Model
6:51 - But I Haven't Been Breached
7:45 - Phishing Example
9:53 - Should You Stay On-Premises?
10:52 - Closing Thoughts
#CyberSecurity #Cloud
Видео Is the Cloud Secure Enough? канала Pro Tech Show
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Two Factor Authentication - More Security, Less Effort](https://i.ytimg.com/vi/z_RmcLzrUng/default.jpg)
![Building the ultimate USB boot drive](https://i.ytimg.com/vi/ioIxdKr_Ip8/default.jpg)
![SRE, DevOps, Kubernetes & Chaos Engineering ft. Rich Burroughs](https://i.ytimg.com/vi/ki4aTpemsH0/default.jpg)
![Heartbleed - What Happened? A Bug That Nearly Broke the Internet](https://i.ytimg.com/vi/eCGKf1XD-ME/default.jpg)
![Infrastructure as Code Explained](https://i.ytimg.com/vi/iHK65awT6zs/default.jpg)
![What Is a VPN and Should You Use One?](https://i.ytimg.com/vi/IZ4885mgQXo/default.jpg)
![7 Things to Know Before Using Office 365](https://i.ytimg.com/vi/yioOE6mIo0w/default.jpg)
![More Useful Tools for IT Pros](https://i.ytimg.com/vi/tW8JGQPo58Y/default.jpg)
![Big Vs Small Public Cloud Providers](https://i.ytimg.com/vi/LJomGBuBDaU/default.jpg)
![Serverless Architecture Explained](https://i.ytimg.com/vi/Y6iY279lBqM/default.jpg)
![The New Windows Terminal: Command Line Just Got Better](https://i.ytimg.com/vi/mtMjkvn9kSw/default.jpg)
![Windows 10 Can Run Linux!? | Windows Subsystem for Linux](https://i.ytimg.com/vi/lhREST4uiqw/default.jpg)
![Hacking (and Protecting) a Windows Network with Bad Physical Security](https://i.ytimg.com/vi/dQli0wqyrME/default.jpg)
![An Open Source Exchange Server | Grommunio](https://i.ytimg.com/vi/pgshtE0eHAs/default.jpg)
![You Should Learn PowerShell](https://i.ytimg.com/vi/tBqN8NJLXyE/default.jpg)
![Best FREE Vulnerability Scanner: Nessus Vs OpenVAS (Greenbone)](https://i.ytimg.com/vi/sEzN2U4Pqcs/default.jpg)
![Setting Traps for Hackers](https://i.ytimg.com/vi/rBa8i8GkHnc/default.jpg)
![Hyperconverged Infrastructure Explained](https://i.ytimg.com/vi/xZvLvKv1rjs/default.jpg)
![EDR, MDR & XDR Explained](https://i.ytimg.com/vi/z983AM8etCA/default.jpg)
![How to Protect Your Devices from Hackers](https://i.ytimg.com/vi/8lFxRO5qerM/default.jpg)