Cyber security

Cloud security starts with the shared responsibility line

A useful starting point is to draw a clear line between what the provider is responsible for and what you’re responsible for, which means you avoid assuming that “cloud” automatically equals “covered”. In most mainstream services, the provider is responsible for the underlying infrastructure, including hardware, data centres and core service availability, while you’re responsible for users, access, data handling, and the way features are configured. That distinction matters because most cloud services will do exactly what they’re configured to do, which means if a user deletes a folder, the system will often treat that as a valid action and synchronise the change. If a link is set to “anyone with the link”, the system will happily make it accessible, because it’s following instructions, not making judgement calls. When teams understand this line, security conversations become calmer. Instead of debating whether the cloud is “safe”, you can focus on whether your configuration and habits match the risks you actually carry.

Identity becomes the new perimeter

In an office-first world, security often leaned on the idea of a trusted internal network, which means being in the building and on the Wi‑Fi implied a level of safety. Cloud services remove that assumption, which means the question becomes “who is signing in” rather than “where are they”. That shift makes identity the single most important control in many cloud setups. This is also why compromised accounts are such a common cause of cloud incidents. If someone gets a valid username and password, they often don’t need to break anything else, which means the cloud service may treat them as a legitimate user. Strengthening sign-in therefore reduces risk quickly, especially when it’s applied consistently to email, file sharing, finance systems and any tool connected to customer data. The practical implication is that passwords alone are rarely enough. Adding additional sign-in checks and reducing reliance on reused credentials lowers the chance that one mistake becomes an incident, and it also makes it easier to spot unusual access patterns when they happen.

Access sprawl is the quiet risk that grows with the business

Cloud services are built to share, which means access tends to expand naturally as collaboration increases. The problem is that access usually expands faster than it’s reviewed, which means people keep permissions they no longer need, contractors retain access longer than intended, and shared folders become “everyone” folders because it’s quicker than managing roles. This is where many UK businesses end up exposed without realising it. Sensitive files don’t have to be publicly available to be a risk, which means they only need to be accessible to the wrong internal group or an external guest who was never removed. This is also where data protection responsibilities become real, because if personal data is accessible beyond what’s necessary, the business is carrying avoidable risk even before any breach occurs. A simple habit that helps is to treat access like a living thing. If people join, move roles, or leave, access should change with them, which means you need a joiner and leaver process that includes cloud tools and third-party services, not just email. It also helps to reduce shared accounts, because shared access removes accountability and makes it harder to revoke access cleanly when someone leaves.

Misconfiguration beats malware as a cause of exposure

A lot of cloud security problems come down to settings, which means the “attack” is often the result of convenience winning a small decision. Open sharing links, guest access left on by default, admin privileges granted for routine tasks, and security alerts not configured properly all create openings that don’t look like openings at the time. This is why default settings deserve attention. Most platforms ship with defaults that aim to reduce friction, which means they’re designed to help people collaborate quickly. That’s not inherently bad, but it can be risky when sensitive data is involved, which is why it’s worth deciding what your default sharing posture should be. A practical way to think about it is to make the safe option the easy option. If internal sharing is the default and external sharing requires a deliberate step, people still get work done, which means you reduce accidental exposure without blocking genuine collaboration.

Third-party apps and integrations widen the attack surface

Most businesses don’t run on one cloud service. They use a core productivity platform, then layer on CRM, finance, marketing, support and specialist systems, which means data moves between services constantly. This is where risk quietly increases, because every integration is effectively a new door into your data. The problem isn’t that integrations exist. It’s that permissions are often broader than necessary, which means a tool is granted access to “all files” or “all mailboxes” when it only needs a small subset. Ownership is often unclear too, which means when someone signs up for a tool and connects it to company accounts, it can become business critical without anyone formally deciding that’s acceptable. A sensible habit here is to treat connected apps like suppliers with keys. Someone should own each tool, understand what it can access, and be able to disable it quickly if needed, which means you’re not scrambling during an incident or a staff departure. It also helps to remove unused integrations, because old connections are an easy place for risk to hide.

Backups in the cloud still matter, because synchronisation isn’t recovery

Cloud platforms are resilient, which means they’re good at keeping services available and protecting against hardware failure. That resilience is not the same thing as backup, because backup is about recovery to a previous point in time. If files are deleted, overwritten, or encrypted by ransomware, synchronisation can spread the damage quickly, which means the cloud can replicate the problem very efficiently. This is why independent backups remain important even in cloud-first setups. A useful backup is separate enough that it won’t be affected by the same compromise, and it’s retained long enough that delayed discovery doesn’t remove your recovery options. Testing restores matters too, because an untested backup is a hope rather than a plan, which means the first restore attempt shouldn’t happen in the middle of an incident. For many organisations, the practical goal is to be able to restore a small number of critical datasets quickly, rather than trying to rebuild everything at once. That’s a business continuity decision as much as a technical one.

Devices and endpoints are still part of cloud security

Cloud security often gets discussed as if it’s purely a platform problem, but the cloud is accessed through devices, which means laptops and phones are part of the security boundary. If devices are unpatched, shared with family members, or missing basic protections like screen locks, cloud controls have to work much harder. This matters particularly with remote and hybrid working, which means devices spend more time outside controlled environments. The aim isn’t to micromanage personal life. It’s to ensure that any device used to access business systems meets minimum standards around updates, encryption, and access control, which reduces the chance that a lost laptop becomes a data incident. Clear expectations help here, especially when personal devices are used for work. Separating work and personal data where possible, and being able to remove business access when someone leaves, reduces conflict and risk at the same time.

Visibility is what turns security from guessing into management

Many cloud platforms provide logs, alerts and audit trails, but they’re often underused because they feel technical. The cost of ignoring them is that unusual behaviour goes unnoticed, which means you only discover issues after the impact is visible. Basic visibility doesn’t require constant monitoring. It requires a few sensible alerts and someone accountable for responding to them, which means repeated failed sign-ins, unusual access locations, or unexpected permission changes don’t slip by silently. This is also where clarity of ownership matters. If nobody owns security signals, they become background noise, which means alerts either don’t get set up or get ignored. Assigning responsibility for reviewing key events, even on a light schedule, tends to improve response quality dramatically.

Cloud security gets easier when it’s treated as an operating habit

The cloud isn’t usually the weakest link. The weakest link is the set of everyday decisions made around identity, access and sharing, which means cloud security improves most when it’s built into normal operations rather than handled as a one-off project. A practical operating habit looks like this. New starters get access through role-based groups rather than one-off permissions, which means access is easier to review later. Leavers have access removed across core systems and connected apps, which means accounts don’t linger. Sensitive data is stored in agreed locations with tighter sharing defaults, which means staff don’t have to guess. Backups are treated as recoverability, not availability, which means restores are possible when something goes wrong. When those habits exist, cloud services become what they’re meant to be. They’re flexible, scalable and reliable, which means your team can move quickly without creating invisible risk in the background. That’s the point of cloud security done well, because it isn’t about fear or complexity, it’s about keeping the business running confidently as it grows.