{"id":8929,"date":"2021-11-23T14:50:24","date_gmt":"2021-11-23T14:50:24","guid":{"rendered":"https:\/\/oxfordcorp.com\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/"},"modified":"2023-10-18T20:08:30","modified_gmt":"2023-10-18T20:08:30","slug":"an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources","status":"publish","type":"post","link":"https:\/\/www.oxfordcorp.com\/fr\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/","title":{"rendered":"An Overview of Cloud Computing and IT Security"},"content":{"rendered":"<p>The concept of cloud computing has been around since the 90s, but it wasn\u2019t until 2006 that Amazon and Google launched their first cloud services. Fifteen years later, cloud computing has become extremely pervasive, with <a href=\"https:\/\/techjury.net\/blog\/cloud-computing-statistics\/#gref\" rel=\"nofollow\">67% of enterprise infrastructure<\/a> in a cloud-based system, and over 40 zettabytes of data in cloud servers and networks.<\/p>\n<p>The COVID pandemic has seen IT companies rush to create new solutions that meet businesses&rsquo; unique needs, especially remote work. As a result, the public cloud computing market is expected to be <a href=\"https:\/\/techjury.net\/blog\/how-many-companies-use-cloud-computing\/#gref\" rel=\"nofollow\">worth $800 billion by 2025<\/a>.<\/p>\n<h3><strong>Which Companies Are Dominating the Cloud\u00a0Computing Industry?<\/strong><\/h3>\n<p>The term \u201ccloud computing\u201d doesn\u2019t convey the true extent of its capabilities. Some will see it as a service that provides on-demand computing solutions ideal for keeping businesses scalable. Others see the need for cloud computing for the storage of data and resources that can be accessed by users\u00a0around the world.<\/p>\n<p>Throughout the last decade, large tech companies and some lesser-known service providers have been wrestling for market share in the cloud computing space. As of <a href=\"https:\/\/www.zdnet.com\/article\/the-top-cloud-providers-of-2021-aws-microsoft-azure-google-cloud-hybrid-saas\/\" rel=\"nofollow\">spring 2021<\/a>, the following organizations commanded much of the global cloud computing market<\/p>\n<ol>\n<li><strong>Amazon Web Services (AWS) Cloud<\/strong> \u2013 as the market leader, AWS currently holds 33% of the cloud computing market. Of the 13 million cloud servers around the world, AWS controls about half of them. In the first quarter of 2021 alone, AWS made $13.5 billion in cloud services (beating analysts\u2019 predictions of $13.1 billion) and outpacing their Q1 2020 numbers by about $3 billion.<\/li>\n<li><strong>Microsoft Azure<\/strong> \u2014 holds about <strong>20% <\/strong>of the cloud market. Azure brought in $20.7 billion in revenue in the first quarter of 2021, up 36% from the same quarter last year.<\/li>\n<li><strong>Google Cloud Platform (GCP)<\/strong> \u2013 currently has 10% of the market share. Google Cloud brought in $4.9 billion in revenue for the third quarter of 2021.<\/li>\n<li><strong>Alibaba Cloud<\/strong> \u2013 is in fourth place with 9% of the market \u2013 which includes 59% of all companies in China. In the second quarter of 2021, Alibaba\u2019s cloud revenue grew approximately 50% to nearly $2.5 billion.<\/li>\n<\/ol>\n<h3><strong>Concerns Over the Significant and Rapid Growth of\u00a0Cloud Computing<\/strong><\/h3>\n<p>For many organizations, the advantages of using Cloud computing services far outweigh the potential negatives. The problem is that the potential negatives are almost all related to security. This threat significantly grew when companies had to adjust to work-from-home settings, thus making themselves more vulnerable to attack. As governments tighten data regulations and cybercriminals become even more equipped and able, having access to capable experienced IT security experts is always a best practice.<\/p>\n<p>Below are some of the major IT security and cloud computing trends that we are monitoring:<\/p>\n<h3><strong>Cybersecurity Attacks<\/strong><\/h3>\n<p>SolarWinds was one of the most shocking cybersecurity attacks to date. In March 2020, hackers secretly broke into the systems of a major US IT firm named SolarWinds. The intruders, who went undetected for as long as nine months, preceded to install malicious code inside SolarWinds\u2019 Orion IT product \u2013 a network monitoring and management tool used by 33,000 government and private industry clients worldwide. The corruption was so thorough that the hackers set up a command-and-control infrastructure inside SolarWinds\u2019 system. As a result, Orion IT system updates, loaded with trojans, were unknowingly uploaded by 18,000 SolarWinds customers, giving the attackers access to their login credentials, networks, systems, and digital signatures.<\/p>\n<p>The hackers also exploited flaws in Microsoft and VMware products, enabling them to intercept emails and other documents and sign in to other applications those victims had access to.\u00a0 In mid-December 2020, SolarWinds had been hacked; however, the extent of the hack was unclear. Eventually, it was revealed that the data breach had compromised many areas of the US Federal Government (including the Departments of Agriculture, Commerce, Defense, Energy, Homeland Security, Justice, Labor, State, Treasury, the National Institutes of Health, and National Telecommunications and Information Administration). Global victims included NATO, the UK government, and the European Parliament. As a precaution, thousands of SolarWinds customers had to take their systems off-line to be decontaminated. A former Homeland Security Advisor, familiar with the details of the attack, said it could take years to completely evict the attackers from US networks as they continue to monitor, destroy, or tamper with data.<\/p>\n<h3><a><strong>Malware, Phishing, and BEC<\/strong><\/a><\/h3>\n<p>Traditional malware attacks have been led by the rapid increase in phishing and Business Email Compromise (BEC) schemes. Malware launched through phishing and BEC can quickly spread from one employee to another. According to\u00a0<a href=\"https:\/\/www.mimecast.com\/state-of-email-security\/download-hub\/\" target=\"_blank\" rel=\"nofollow noopener\">Mimecast<\/a>, phishing attacks are up 63%, while BEC attacks are up 51%.\u00a0Additionally, since more employees than ever are working from home through the pandemic, many are taking the BYOD (Bring Your Own Device) route \u2013 this dramatically increases the chance that BYOD-based malware on personal computers will infect the cloud services that home-based employees are accessing.\u00a0 Overall, 70% of companies surveyed expect their business will be harmed by an email-based attack in 2021.<\/p>\n<h3><strong>Ransomware<\/strong><\/h3>\n<p>In the same report by Mimecast, 61% of the organizations that took part in the study were impacted by ransomware in 2020 \u2013 resulting in the loss, on average, of six days of work. Of these victims, 52% paid the ransom, but only two out of three (of the companies who paid the ransom) got their data back.<\/p>\n<h3><strong>Spoofing and Brand Impersonation<\/strong><\/h3>\n<p>Currently, nine out of ten companies report that they are threatened by online brand impersonation, where hackers \u201cspoof\u201d or make realistic copies of a company\u2019s corporate website to steal legitimate customers\u2019 money and identification. Globally, the average company experienced nine spoofing attempts a year. However, German companies discovered these scams most often, at a rate of 14 attempts a year. Over 92% of responders to the Mimecast report are currently using or soon plan to implement anti-spoofing solutions.<\/p>\n<h3><strong>Internet of Things (IoT)<\/strong><\/h3>\n<p>Again, IoT has brought about incredible changes to our lives, but it also opens the door to more cloud security threats. Once upon a time, the Internet was restricted to our PCs. Today, with so many devices connected to Wi-Fi networks, the chance of a hacker breaking into a network through a secondary device is no longer science fiction.<\/p>\n<h3><strong>Why is Cloud Security so Difficult\u00a0to Tackle?<\/strong><\/h3>\n<p>Cybersecurity roles are possibly one of the most difficult to find in the IT industry because of the speed of change. An expert can create, implement, and master one set of cybersecurity protocols, and the very next day, a hacker can find a new vulnerability. To say that Cybersecurity professionals need to stay ahead of the game is an understatement.<\/p>\n<p>ISC<sup>2<\/sup>, in its <a href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2021\/ISC2-Cybersecurity-Workforce-Study-2021.ashx\" target=\"_blank\" rel=\"nofollow noopener\">2021 Cybersecurity Workforce Study<\/a><u>,<\/u>\u00a0showed that to meet current demands, we will need 700,000 extra IT security professionals or, in other words, a 30% increase in the US and a 25% increase in Europe. During the COVID-19 crisis, nearly half of IT professionals were reassigned to different roles to offer more support as companies switched to remote working. This is ironic since the cybersecurity personnel surveyed believe the workforce gap is their number one concern, and 60% feel they are also experiencing a talent shortage.<\/p>\n<p>Finding the right Cybersecurity expert is a difficult task due to the required combination of the proper training and the passion for continuous learning. Unfortunately, there are not enough university programs offering specialist courses in cybersecurity. Only now are we seeing the rise in boot camps for specialist training and technology companies that provide their security team with the appropriate training. But even this isn\u2019t addressing the full scope of the issue.<\/p>\n<p>COVID-19 will continue to have a negative impact on companies as the financial crisis begins to worsen. Some companies are forced to reduce the size of their teams. This creates a vicious cycle where companies that can&rsquo;t afford to hire cybersecurity professionals will be more at risk of attacks.<\/p>\n<h3><strong>What&rsquo;s\u00a0the Solution?<\/strong><\/h3>\n<p>COVID-19, hacking threats, and a shortage of cybersecurity personnel will undoubtedly hamstring business processes for the near future. \u00a0Luckily there are two solutions available: (1) installing the most secure network solution, and (2) partnering with a company experienced in these specialized areas.<\/p>\n<h3><a><strong>Secure Networks: The Future is SASE<\/strong><\/a><\/h3>\n<p>Secure access service edge (SASE) is an emerging cybersecurity networking concept intended for companies who must provide their remote employees \u2013 wherever they are physically located \u2013 with quick, secure, uninterruptable access to data and software-as-a-service (SaaS) applications hosted on the Cloud.<\/p>\n<p>SASE was envisioned as the convergence of wide-area networking (WAN) and network security services \u2013 like CASB, FWaaS, and Zero Trust \u2013 into a single, cloud-delivered service model. Additional security services, such as threat prevention, web filtering, sandboxing, DNS security, credential theft prevention, data loss prevention, and next-generation firewall policies, can be implemented as needed. Information is delivered to entities based upon: their digital identity (i.e., a specific person, groups of people, devices, systems, etc.), real-time context, policies (company or regulatory), and a continuous assessment of risk\/trust throughout the sessions.<\/p>\n<p>This enables the SASE architecture to automatically identify users and devices, apply policy-based security accordingly, and then deliver secure access to the appropriate application or data. This methodology allows organizations to apply secure access no matter where their users, applications, or devices are located.<\/p>\n<h3><strong>Secure Partners: The Best Help<\/strong><\/h3>\n<p>As previously mentioned, IT staffs are under stress due to budget cuts, labor shortages, the extra demand of supporting people working from home, and maintaining day-to-day digital operations. In an ideal world, organizations would have every resource needed on hand. However, in the real world, the next best thing is to have a group of specialists available to handle whatever challenges arise \u2013 a solid, go-to partnership could be the differentiator in today\u2019s fast-paced IT world.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud computing has become one of the most popular terms on the internet \u2014 appearing 48 million times. Is your organization prepared? Discover more about the core IT security and cloud computing trends of today.<\/p>\n","protected":false},"author":10,"featured_media":23830,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[183],"tags":[116,252,251],"category-tag":[],"class_list":["post-8929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-consumer-industrial","tag-financial-services-insurance","tag-technology-communications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>An Overview of Cloud Computing and IT Security - Oxford<\/title>\n<meta name=\"description\" content=\"Cloud computing has become one of the most popular terms on the internet \u2014 appearing 48 million times. Is your organization prepared? Discover more about the core IT security and cloud computing trends of today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oxfordcorp.com\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Overview of Cloud Computing and IT Security\" \/>\n<meta property=\"og:description\" content=\"Cloud computing has become one of the most popular terms on the internet \u2014 appearing 48 million times. Is your organization prepared? Discover more about the core IT security and cloud computing trends of today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"Oxford\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-23T14:50:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-18T20:08:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2021\/11\/Website-Graphics-1920-X-1080-31.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Luke Summers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luke Summers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/\"},\"author\":{\"name\":\"Luke Summers\",\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/de\\\/#\\\/schema\\\/person\\\/e880f6edc6bcf421204f294431943cd3\"},\"headline\":\"An Overview of Cloud Computing and IT Security\",\"datePublished\":\"2021-11-23T14:50:24+00:00\",\"dateModified\":\"2023-10-18T20:08:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/\"},\"wordCount\":1569,\"image\":{\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.oxfordcorp.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Website-Graphics-1920-X-1080-31.jpg\",\"keywords\":[\"Consumer &amp; Industrial\",\"Financial Services &amp; Insurance\",\"Technology &amp; Communications\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/\",\"url\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/\",\"name\":\"An Overview of Cloud Computing and IT Security - Oxford\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.oxfordcorp.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Website-Graphics-1920-X-1080-31.jpg\",\"datePublished\":\"2021-11-23T14:50:24+00:00\",\"dateModified\":\"2023-10-18T20:08:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/de\\\/#\\\/schema\\\/person\\\/e880f6edc6bcf421204f294431943cd3\"},\"description\":\"Cloud computing has become one of the most popular terms on the internet \u2014 appearing 48 million times. Is your organization prepared? Discover more about the core IT security and cloud computing trends of today.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.oxfordcorp.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Website-Graphics-1920-X-1080-31.jpg\",\"contentUrl\":\"https:\\\/\\\/www.oxfordcorp.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Website-Graphics-1920-X-1080-31.jpg\",\"width\":1600,\"height\":900,\"caption\":\"Website Graphics 1920 X 1080 31\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/es\\\/insights\\\/blog\\\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.oxfordcorp.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An Overview of Cloud Computing and IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.oxfordcorp.com\\\/de\\\/\",\"name\":\"Oxford\",\"description\":\"Global\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.oxfordcorp.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.oxfordcorp.com\\\/de\\\/#\\\/schema\\\/person\\\/e880f6edc6bcf421204f294431943cd3\",\"name\":\"Luke Summers\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g\",\"caption\":\"Luke Summers\"},\"url\":\"https:\\\/\\\/www.oxfordcorp.com\\\/fr\\\/insights\\\/author\\\/lsummersthiel-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"An Overview of Cloud Computing and IT Security - Oxford","description":"Cloud computing has become one of the most popular terms on the internet \u2014 appearing 48 million times. Is your organization prepared? Discover more about the core IT security and cloud computing trends of today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oxfordcorp.com\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/","og_locale":"fr_FR","og_type":"article","og_title":"An Overview of Cloud Computing and IT Security","og_description":"Cloud computing has become one of the most popular terms on the internet \u2014 appearing 48 million times. Is your organization prepared? Discover more about the core IT security and cloud computing trends of today.","og_url":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/","og_site_name":"Oxford","article_published_time":"2021-11-23T14:50:24+00:00","article_modified_time":"2023-10-18T20:08:30+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2021\/11\/Website-Graphics-1920-X-1080-31.png","type":"image\/png"}],"author":"Luke Summers","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Luke Summers","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/#article","isPartOf":{"@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/"},"author":{"name":"Luke Summers","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3"},"headline":"An Overview of Cloud Computing and IT Security","datePublished":"2021-11-23T14:50:24+00:00","dateModified":"2023-10-18T20:08:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/"},"wordCount":1569,"image":{"@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2021\/11\/Website-Graphics-1920-X-1080-31.jpg","keywords":["Consumer &amp; Industrial","Financial Services &amp; Insurance","Technology &amp; Communications"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/","url":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/","name":"An Overview of Cloud Computing and IT Security - Oxford","isPartOf":{"@id":"https:\/\/www.oxfordcorp.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/#primaryimage"},"image":{"@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2021\/11\/Website-Graphics-1920-X-1080-31.jpg","datePublished":"2021-11-23T14:50:24+00:00","dateModified":"2023-10-18T20:08:30+00:00","author":{"@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3"},"description":"Cloud computing has become one of the most popular terms on the internet \u2014 appearing 48 million times. Is your organization prepared? Discover more about the core IT security and cloud computing trends of today.","breadcrumb":{"@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/#primaryimage","url":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2021\/11\/Website-Graphics-1920-X-1080-31.jpg","contentUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2021\/11\/Website-Graphics-1920-X-1080-31.jpg","width":1600,"height":900,"caption":"Website Graphics 1920 X 1080 31"},{"@type":"BreadcrumbList","@id":"https:\/\/www.oxfordcorp.com\/es\/insights\/blog\/an-overlook-of-cloud-computing-and-it-security-from-oxford-global-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oxfordcorp.com\/"},{"@type":"ListItem","position":2,"name":"An Overview of Cloud Computing and IT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.oxfordcorp.com\/de\/#website","url":"https:\/\/www.oxfordcorp.com\/de\/","name":"Oxford","description":"Global","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oxfordcorp.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3","name":"Luke Summers","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g","caption":"Luke Summers"},"url":"https:\/\/www.oxfordcorp.com\/fr\/insights\/author\/lsummersthiel-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/posts\/8929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/comments?post=8929"}],"version-history":[{"count":0,"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/posts\/8929\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/media\/23830"}],"wp:attachment":[{"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/media?parent=8929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/categories?post=8929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/tags?post=8929"},{"taxonomy":"category-tag","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/fr\/wp-json\/wp\/v2\/category-tag?post=8929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}