Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >How to accelerate cloud migration for remote working without compromising data security
    Technology

    How to Accelerate Cloud Migration for Remote Working Without Compromising Data Security

    Published by linker 5

    Posted on October 14, 2020

    5 min read

    Last updated: January 21, 2026

    Add as preferred source on Google
    Untitled design – 2020-10-14T153445.438
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    By Daniel Cooper of Lolly.co

    The mass migration from the office 9-to-5 provided a fundamental solution for businesses seeking to survive the disruption of the Covid-19 pandemic. And as the move towards remote working is fast-tracked, a number of opportunities – and a number of issues – has arisen, too. Socially distanced workflows rely heavily on the cloud, but the weight of the responsibility can give way to weakness in the face of cybersecurity threats.

    Cloud migrations were once a pioneering move prior to 2020. Now they are a necessity to facilitate basic business processes. The overnight shift, as with all rushed decisions, brings a plethora of potential problems that leave a business vulnerable to cybercriminal activities. Data breaches, data leaks, and data loss are flagged as the greatest threats to cloud migrations. By putting in place protections that secure data, secure connections, and limit access to files for users, a seamless move towards remote working can also be impenetrable.

    Such protections extend to private VPNs, password managers, physical 2FA keys, and a zero-trust policy for file access.

    Virtual Private Networks – or VPNs – are typically called up as the first line of defense. Rather than allowing the migration of business data to the cloud via the internet, a VPN secures a private path cybercriminals pose no threat to. VPNs also protect online browsing activities, securing both internet and data protection on a number of different devices. However, the security provided by VPNs can only stretch so far. They cannot confirm the identities of those accessing the network, nor do they restrict the network access.

    VPNs therefore must be used in conjunction with other options that plug the gaps in this security measure.

    Password managers facilitate cloud migration not simply by providing more secure, stronger passwords for entire teams, but they also provide control to access for certain applications, websites, and files that need to be accessed from home. Shared passwords can be provided for select employees and removed if necessary, patching the holes in your security at a ground-level. These password managers should lead the organisation’s move toward refreshed security policies that are required for remote working.

    However, password managers should be used alongside two-factor authentication to limit the risk of a security breach and protect the password manager itself.

    Two-factor authentication is a secure method of confirming the identity of a user. By testing two pieces of information or ‘factors’, access can be far more secure, solving the issues associated with data protection measures such as VPNs. Alternative factors to passwords include a physical device such as a phone or a ‘key’, and a fingerprint or facial scan.

    2FA keys also erase potential security breaches that poor password hygiene can typically leave data victim to. As passwords are easily breached by cybercriminals and can be used repeatedly, these physical keys provided by firms such as Yubico can ensure the right access to the cloud is afforded to the right employees.

    Secure passwords and two-factor authentication can ensure only select users can access certain files, effectively locking down data. A zero-trust policy further strengthens this access. Data breaches and leaks are often as a result of cyber attacks fuelled by ease of access to data; this direct-to-cloud approach allows firms to eliminate any unauthorized access to data, ensuring they can monitor and control their IT environment.

    Administrators can thus have full visibility and control over the individual users’ access to certain data. Zero Trust Network Access (ZTNA) follows several principles such as ensuring that communication with private applications can be secure regardless of the user’s location; guaranteeing access to individual resources is solely granted on a per-connection basis; and making sure all traffic to applications is fully visible to administrators.

    A zero-trust policy pulls together the threads of these cloud migration security measures, ensuring that not only can the right users access the right data, but administrators can be sure that this remains true.

    Each of these measures follows the basic tenets of data security and protection against cyber threats and attacks on a number of levels whilst also facilitating cloud migration. From basic security measures at the employee level regarding strong, secure passwords, to the overarching monitoring of who accesses what at the top of the business, data leaks, breaches, and loss can be eliminated. Not only can these protections provide for the movement from on-premises data to the cloud during the cloud migration, they can be scaled over time, too.

    Employee access to certain passwords and files, for example, can be increased alongside changing responsibilities and decreased in response to a need for more secure data protection.

    Arming against threats to business data requires a multi-pronged approach, especially as every measure comes with its own potential and its own problems. Satisfying the need for additional security measures in each creates an impenetrable barrier for business whether the employees are working in the office or at the dining table. The need for protection against cyber criminals will only escalate as attacks focus on the weaknesses inherent in cloud migration and cloud security.

    The cloud migration process allows for a streamlined movement towards the new normal. Securing it is the next challenge.

    More from Technology

    Explore more articles in the Technology category

    Image for Showcasing Digital Leadership – Best Bank for Social Media 2026
    Showcasing Digital Leadership – Best Bank for Social Media 2026
    Image for Innovation Through Partnership: The Role of External Tech Teams
    Innovation Through Partnership: The Role of External Tech Teams
    Image for Nominations Open for Technology Awards 2026
    Nominations Open for Technology Awards 2026
    Image for Nominations Open for Innovation Awards 2026
    Nominations Open for Innovation Awards 2026
    Image for Archie earns industry recognition across G2, Capterra, and SoftwareReviews
    Archie Earns Industry Recognition Across G2, Capterra, and SoftwareReviews
    Image for The Bankaool Transformation: How a Regional Mexican Bank Became a Fintech Disruptor
    The Bankaool Transformation: How a Regional Mexican Bank Became a FinTech Disruptor
    Image for Submit Your Entry Today for Digital Banking Awards 2026
    Submit Your Entry Today for Digital Banking Awards 2026
    Image for Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Image for Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Image for Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Image for Entrepreneurial Discipline in the AI Economy: Insights from Dmytro Lavryniuk
    Entrepreneurial Discipline in the AI Economy: Insights From Dmytro Lavryniuk
    Image for Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Entries Now Open for Best New Digital Wallet Innovation Award 2026
    View All Technology Posts
    Previous Technology PostProtecting the Financial Services Sector, as It Becomes Increasingly Vulnerable to Ransomware
    Next Technology PostLeveraging Cloud Connectivity for a Digitalised Experience in a ‘New Normal’