{"id":7602,"date":"2023-01-10T12:31:54","date_gmt":"2023-01-10T10:31:54","guid":{"rendered":"https:\/\/www.microbase.gr\/cloud-security\/"},"modified":"2023-01-10T13:06:46","modified_gmt":"2023-01-10T11:06:46","slug":"cloud-security","status":"publish","type":"post","link":"https:\/\/www.microbase.gr\/en\/cloud-security\/","title":{"rendered":"Cloud | Our digital security today"},"content":{"rendered":"<p>Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.<\/p>\n<p><!--more--><\/p>\n<p><strong>Our digital security<\/strong> nowadays has gained an important place, whether we are individuals or businesses\/organizations since this too can affect both our personal and material security.<\/p>\n<p><strong>As individuals<\/strong>, being suspicious of the digital notifications we receive, may be enough.<\/p>\n<p><strong>As businesses<\/strong>, being suspicious is not enough. Identifying and mitigating risks is one thing. But trusting digital security experts to prevent risks in a multi-layered framework, is <strong>the need of the hour<\/strong>.<\/p>\n<p>And especially as the business (inevitably) moves to the <strong>Cloud<\/strong>, there are many &#8220;doors&#8221; that an attacker can breach. We are not referring to the case where the business has more than one Cloud Provider, because then the challenges multiply.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7596\" src=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg\" alt=\"\" width=\"866\" height=\"578\" \/><\/p>\n<p><strong><em>So how can we protect our assets in the Cloud?<\/em><\/strong><\/p>\n<p>Creating a secure Cloud blueprint is a key step in our first line of defense, aiming to strengthen our weak points.<br \/>\n<strong>As a first move<\/strong>, we ask ourselves:<\/p>\n<ul>\n<li>What visibility and context do I have into my network and Cloud assets?<\/li>\n<li>How do my users help or hinder good security?<\/li>\n<li>What integration is possible with the current security I have implemented?<\/li>\n<li>How can DevOps become DevSecOps without losing agility?<\/li>\n<li>Can I easily implement and enforce uniform policies across all endpoints (end point security)?<\/li>\n<li>Will I have a single portal for complete management?<\/li>\n<\/ul>\n<p><strong>The next move<\/strong> is understanding the security we already have for the Cloud and the security we need. Unequivocal management of our digital security will make it easier to manage our business and lead to a <strong>faster return on investment (ROI)<\/strong>.<\/p>\n<p>For our digital security we trust <strong>a certified partner<\/strong> that has a range of Solutions, the implementation of which will protect our data and ensure access to it only by our users.<\/p>\n<h3><strong>We focus on prevention and not treatment!<\/strong><\/h3>\n<blockquote>\n<h2><span style=\"color: #ff6600;\">Read Check Point&#8217;s Cloud Security Trends Report: <a style=\"color: #ff6600;\" href=\"https:\/\/pages.checkpoint.com\/2022-cloud-security-report.html\">Cloud Security Report<\/a><\/span><\/h2>\n<\/blockquote>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.<\/p>\n","protected":false},"author":6,"featured_media":7596,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64],"tags":[],"class_list":["post-7602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud | Our digital security today - Microbase<\/title>\n<meta name=\"description\" content=\"Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microbase.gr\/en\/cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud | Our digital security today\" \/>\n<meta property=\"og:description\" content=\"Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microbase.gr\/en\/cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Microbase\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-10T10:31:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-10T11:06:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845-1300x867.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1300\" \/>\n\t<meta property=\"og:image:height\" content=\"867\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"margarita\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cloud | Our digital security today\" \/>\n<meta name=\"twitter:description\" content=\"Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"margarita\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/\"},\"author\":{\"name\":\"margarita\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a\"},\"headline\":\"Cloud | Our digital security today\",\"datePublished\":\"2023-01-10T10:31:54+00:00\",\"dateModified\":\"2023-01-10T11:06:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/\"},\"wordCount\":331,\"publisher\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/\",\"url\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/\",\"name\":\"Cloud | Our digital security today - Microbase\",\"isPartOf\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg\",\"datePublished\":\"2023-01-10T10:31:54+00:00\",\"dateModified\":\"2023-01-10T11:06:46+00:00\",\"description\":\"Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microbase.gr\/en\/cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/#primaryimage\",\"url\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg\",\"contentUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg\",\"width\":5296,\"height\":3531,\"caption\":\"padlock on a computer circuit board\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microbase.gr\/en\/cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0391\u03c1\u03c7\u03b9\u03ba\u03ae\",\"item\":\"https:\/\/www.microbase.gr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud | Our digital security today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#website\",\"url\":\"https:\/\/www.microbase.gr\/en\/\",\"name\":\"Microbase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microbase.gr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#organization\",\"name\":\"Microbase\",\"url\":\"https:\/\/www.microbase.gr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png\",\"contentUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png\",\"width\":1602,\"height\":350,\"caption\":\"Microbase\"},\"image\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a\",\"name\":\"margarita\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g\",\"caption\":\"margarita\"},\"url\":\"https:\/\/www.microbase.gr\/en\/author\/margarita\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud | Our digital security today - Microbase","description":"Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microbase.gr\/en\/cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"Cloud | Our digital security today","og_description":"Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.","og_url":"https:\/\/www.microbase.gr\/en\/cloud-security\/","og_site_name":"Microbase","article_published_time":"2023-01-10T10:31:54+00:00","article_modified_time":"2023-01-10T11:06:46+00:00","og_image":[{"width":1300,"height":867,"url":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845-1300x867.jpg","type":"image\/jpeg"}],"author":"margarita","twitter_card":"summary_large_image","twitter_title":"Cloud | Our digital security today","twitter_description":"Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.","twitter_image":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg","twitter_misc":{"Written by":"margarita","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/#article","isPartOf":{"@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/"},"author":{"name":"margarita","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a"},"headline":"Cloud | Our digital security today","datePublished":"2023-01-10T10:31:54+00:00","dateModified":"2023-01-10T11:06:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/"},"wordCount":331,"publisher":{"@id":"https:\/\/www.microbase.gr\/en\/#organization"},"image":{"@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/","url":"https:\/\/www.microbase.gr\/en\/cloud-security\/","name":"Cloud | Our digital security today - Microbase","isPartOf":{"@id":"https:\/\/www.microbase.gr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg","datePublished":"2023-01-10T10:31:54+00:00","dateModified":"2023-01-10T11:06:46+00:00","description":"Personal and material security have become a topic of discussion worldwide, especially after the pandemic. They require attention and vigilance.","breadcrumb":{"@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microbase.gr\/en\/cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/#primaryimage","url":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg","contentUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2023\/01\/padlock-computer-circuit-board-e1673346552845.jpg","width":5296,"height":3531,"caption":"padlock on a computer circuit board"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microbase.gr\/en\/cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0391\u03c1\u03c7\u03b9\u03ba\u03ae","item":"https:\/\/www.microbase.gr\/en\/"},{"@type":"ListItem","position":2,"name":"Cloud | Our digital security today"}]},{"@type":"WebSite","@id":"https:\/\/www.microbase.gr\/en\/#website","url":"https:\/\/www.microbase.gr\/en\/","name":"Microbase","description":"","publisher":{"@id":"https:\/\/www.microbase.gr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microbase.gr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microbase.gr\/en\/#organization","name":"Microbase","url":"https:\/\/www.microbase.gr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png","contentUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png","width":1602,"height":350,"caption":"Microbase"},"image":{"@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a","name":"margarita","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g","caption":"margarita"},"url":"https:\/\/www.microbase.gr\/en\/author\/margarita\/"}]}},"_links":{"self":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts\/7602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/comments?post=7602"}],"version-history":[{"count":3,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts\/7602\/revisions"}],"predecessor-version":[{"id":7605,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts\/7602\/revisions\/7605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/media\/7596"}],"wp:attachment":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/media?parent=7602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/categories?post=7602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/tags?post=7602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}