New Training: Vulnerability and Attack Surfaces
In this 8-video skill, CBT Nuggets trainer Keith Barker discusses attack surfaces and vulnerabilities to consider when implementing or managing a secure environment. Watch this new Cisco training.
Watch the full course: Cisco Certified CyberOps Associate
This training includes:
- 8 videos
- 1.1 hours of training
You’ll learn these topics in this skill:
- Intro to Vulnerability and Attack Surfaces
- On-Prem and Cloud-Based Vulnerabilities
- Zero-day Attacks
- Weak Configurations
- Third-Party Risks
- Lack of Patch Management
- Vulnerability Management
- Quiz and Review
What are the Risks of Storing Data with a Third-Party Service Provider?
Over the past decade, the traditional way in which IT environments have used computing resources has shifted from an on-premises architecture model to a cloud-based model. Whether it's an organization's production environment, their backup data, or their high availability zone, organizations are making a massive IT paradigm shift by leveraging third-party service providers' resources to store and manage their sensitive data.
As organizations adopt this third-party service model, it’s important to understand the underlying risks in offloading their sensitive data. Often, organizations assume that by offloading sensitive data to a third-party service provider, they are also transferring the responsibility to that provider. Unfortunately, this is not the case.
It's critically important to understand that as organizations offload sensitive data to third-party service providers, the original organization still maintains compliance and requirements associated with how data is stored and managed. To this point, should the third-party service provider sustain a cyberattack, a data breach, or a compliance violation, the original organization still maintains responsibility for the data and can sustain major fines or loss of reputation.