Despite the sharp upward trend in cyber attacks across all industries and business types, many organizations still rely on their cloud service providers to secure their cloud app software—often without knowing much about the specific security measures being provided.

While granting this level of blind trust to a service provider isn’t automatically bad news (as some providers may handle security adequately), it creates many dangerous unknowns for organizations hoping to avoid expensive and potentially catastrophic data breaches—breaches that today come in many forms.

So, what should service providers include in their cloud app security services package? Here are four key questions organizations should be asking them:

1. Are they setting and enforcing strict data-sharing policies?

If you’ve adopted Microsoft 365 or Google Workspace, your managed service provider should set strict collaboration policies to prevent data from being inadvertently shared with outside third parties or the public. For instance, policies can trigger alerts when files are shared publicly, shared with certain internal groups, or when shared files have particularly sensitive extensions. Such policies not only help define how you want your users to share data in the cloud but can also detect risky behavior, violations, or suspicious data points and activities.

2. Are they enabling automated measures as a secure foundation?

If your managed service provider is not installing automated security measures such as Least Privilege Access and Multi-Factor Authentication (MFA), even a lower-level user might flip the wrong switch and misconfigure an app, exposing your organization’s data accessible to virtually anyone with an Internet connection. It’s widely known in the industry that MFA is the single most important security setting for cloud app security. Recent Microsoft research showed how MFA alone could block 99% of security breaches, yet only 2% of users across organizations have it enabled.

3. Are they adequately protecting against Denial-of-Service attacks?

The current trend whereby remote workers use a wide range of devices to access cloud apps has increased the opportunity for cyber criminals to launch Distributed Denial-of-Service (DDoS) attacks. Here bad actors use multiple tools to flood the bandwidth or resources of a targeted system, rendering it inaccessible to users but not to hackers. DDoS perpetrators often target non-traditional infrastructure, exploit weak device credentials, and can now target an organization’s entire network, not just the corporate website.

4. Are they gathering threat intelligence to outsmart risk?

 Threat intelligence is the analysis of data to generate informed ways to mitigate existing or emerging threats. Security professionals who gather effective threat intelligence can make faster, more informed decisions, shifting from reactive to proactive in the face of cyber-attacks and other risks. Some of the actionable outcomes of threat intelligence include risk mitigation based on recognized chinks in the organizational armor; optimized security posture based on segmentation, user control, and access control; and smarter strategies based on a single view of all data consolidated across cloud apps.

Remove the uncertainty with your cloud app security

Reach out today to learn more about how you can attain a much more transparent, detailed, and proactive approach in a time when cloud app security can’t be left to chance.