© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / Industry News / Cloud Security Remains A Concern For IT

Cloud Security Remains A Concern For IT

  • Author
    Nok Nok News
  • Published
    11 Aug 2022
  • 0 comments
    Join Conversation
Industry News

“Cloud computing” and “cloud-based applications” continue to provide many significant benefits to corporate-level digital activities. Transferring computational and even software needs online in “the cloud” offers companies many cost and operational benefits. Businesses that use cloud computing can achieve their computational needs online without needing to purchase hardware. Often, that cloud-based computational power exceeds what they could afford if they had to buy their own equipment.

At the same time, could-based storage and applications mean that executives and employees no longer have to retrieve data or work on only one machine at a home office. The data and software are always available online, provided staff has the right equipment and clearance to access it.

However, with these tangible work and cost benefits come new concerns such as security.

IT Experts Are Worried About Cyber Security

The ease of access to online data or applications also means that while staff can access their data or software anywhere, potentially from any online-enabled device, this also raises the possibility that criminals can too. Cloud-based storage and computing require extra cyber security considerations, but in a survey conducted across 1500 IT personnel by the Ponemon Institute, 60% of IT and security leaders lacked confidence in their organization’s ability to correctly handle the extra requirements of cyber security that cloud-based operations require. 59% of respondents cited account takeover or credential/ID theft as the top cyber security risk.

Many IT personnel are finding that traditional legacy security methods such as a single-password system are no longer sufficient to enforce modern security needs, especially now that multiple devices can access the same account. New protocols, such as Zero Trust Network Access, employ newer safeguards, such as multifactor authentication, that add extra, more secure levels of access and, in some cases, eliminate the need for passwords entirely, using biometrics, passkey systems, and other mechanisms that don’t require a user to memorize something to get access to an account or data.

A More Secure Future

As more operations shift to a cloud-based architecture, organizations must accompany this shift with an appropriate reinforcement of cyber security. New multifactor security concepts can do away with the vulnerability of a single-password system and eliminate the inconvenience of a long string of alphanumeric characters to try to offset that vulnerability. Groups like the Fast Identity Online Alliance or FIDO are helping to standardize this transition and make it easier and more interoperable for enterprises to get there. If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Nok Nok News

Related Posts

The US Government Now Wants Phishing Resistant MFA
Industry News

The US Government Now Wants Phishing Resistant MFA

The Government Is Now Turning To The Private Sector For Better Cybersecurity
Industry News

The Government Is Now Turning To The Private Sector For Better Cybersecurity

The US Government Is Ramping Up Cybersecurity Precautions
Industry News

The US Government Is Ramping Up Cybersecurity Precautions

Intuit Announce New Advances In Digital Financial Management
Industry News

Intuit Announce New Advances In Digital Financial Management

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語