{"id":1511,"date":"2024-04-25T09:45:06","date_gmt":"2024-04-25T08:45:06","guid":{"rendered":"https:\/\/clouddirect.net\/learning-hub\/?p=1511"},"modified":"2025-04-14T10:04:19","modified_gmt":"2025-04-14T09:04:19","slug":"six-ways-to-stay-secure-in-the-cloud","status":"publish","type":"post","link":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/","title":{"rendered":"Six ways to stay secure in the cloud"},"content":{"rendered":"\n<p>Whether you\u2019ve just moved to Azure, or have been operating in the cloud for a few years, staying secure is a top priority. According to a recent <a href=\"https:\/\/www.isc2.org\/-\/media\/Project\/ISC2\/Main\/Media\/Marketing-Assets\/CCSP\/2023-Cloud-Security-Report-ISC2_final.pdf?rev=85380384b4e248148e14684d8e43375a&amp;hash=27B496154D2B8AF3AEEE725D1BEF392F\">Cloud Security Report<\/a> by Cybersecurity Insiders, \u201995 per cent of organisations are moderately to extremely concerned about cloud security, while another <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">IBM report<\/a> states that the global average cost of a data breach was $4.45 million US dollars. It is, therefore, the perfect time to get on top of your security needs in the cloud.<\/p>\n\n<p>Microsoft Cloud is as vast as it is complex, so it can at first seem tricky to figure out what to do next to stay secure on your cloud journey. If you\u2019re reading this, then that probably means you\u2019ve already decided to start the next chapter of your cloud journey. Learning from experts in the field is a great next step, so you\u2019re in the right place \u2013 we hold five of the six Azure and M365 Microsoft Solutions Partner certifications, as well as being an Azure Expert Managed Service Provider. So, without further ado, here\u2019s our advice our advice on staying secure.<\/p>\n\n\n<h2>Zero Trust<\/h2>\n\n\n<p>Adopting a Zero Trust policy is a fantastic first step when looking to become secure in the cloud. A Zero Trust policy treats all devices as a threat until they are verified, regardless of connection, ownership, or previous access permissions. Nothing is getting access to your network unless you allow it to. This is often used to buffer more traditional security practices, such as using strong and unique passwords, and is even more effective when combined with multi-factor authentication.<\/p>\n\n<p>Implementing a Zero Trust policy requires a bit more than just adopting new technologies. It means changing your culture and training your employees as well. According to the <a href=\"https:\/\/cybernews.com\/editorial\/world-economic-forum-finds-that-95-of-cybersecurity-incidents-occur-due-to-human-error\/#:~:text=With%20over%202%2C000%20cyberattacks%20striking%20the%20internet%20per,human%20error%2C%20according%20to%20the%20World%20Economic%20Forum.\">World Economic Forum<\/a>, 95 per cent of all cybersecurity issues can be traced to human error, and adopting a Zero Trust policy that combines the factors above means that someone accidentally revealing a password or leaving a device behind is no longer as much of a major threat.<\/p>\n\n<p>Zero Trust comes with three guiding principles. There is the previously mentioned <strong>verify explicitly<\/strong>, the practice of always authenticating and authorising data points. There\u2019s <strong>least privileged access<\/strong>, which is a system where you set the boundaries so that everyone gets access to exactly what they need to complete their job function and nothing more than that. Finally, <strong>assume breach<\/strong>, which is the foundation of Zero Trust and assumes that all devices and anomalies are a threat and treats them as such until verified as otherwise.<\/p>\n\n\n<h2>Microsoft Sentinel<\/h2>\n\n\n<p>Sentinel is a cloud-native Security Information and Event Management (SIEM) solution, that monitors signals and data from all applications, services, infrastructure, networks, and users within your estate, regardless of whether it is hosted on-premise, in Azure, or with another cloud service. It provides a bird\u2019s eye view of everything.<\/p>\n\n<p>Because Sentinel is cloud-native it is fully scalable, which allows you to reduce cost during times of low activity and scale to meet demand during times of high traffic. It provides full flexibility for fluctuating workloads.<\/p>\n\n<p>Sentinel also uses advanced analytics and machine learning to proactively detect threats, and will even respond to them itself in real time. If someone\u2019s trying to access your network outside of your agreed region, Sentinel will automatically hold the device in quarantine and deny access until you allow the device in.<\/p>\n\n\n<h2>Microsoft Defender suite<\/h2>\n\n\n<p>The Microsoft Defender suite is a collection of products that will really bolster your security standing.Defender blocks around <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-digital-defense-report-2022\">70 billion email and identity threats each year,<\/a> while Defender for Cloud <a href=\"https:\/\/www.microsoft.com\/content\/dam\/microsoft\/final\/en-us\/microsoft-brand\/documents\/TEI%20of%20Microsoft%20Defender%20For%20Cloud_FINAL%20081022.pdf\">reduced security breaches to cloud workloads by up to 25 per cent.<\/a><\/p>\n\n\n<ul>\n<li><strong>Defender for Cloud<\/strong> allows you to protect your specific Azure workloads.<\/li>\n<li><strong>Defender for Cloud Applications<\/strong> keeps you secure down to the coding level, enabling smoother deployments.<\/li>\n<li><strong>Defender for Endpoints<\/strong> helps you monitor and keep safe end users on your network.<\/li>\n<li><strong>Defender for Microsoft 365<\/strong> allows you to defend your modern work data.<\/li>\n<\/ul>\n\n\n<p>Defender\u2019s cloud-based products are designed to keep all areas of your business protected, from your Azure workloads to more targeted areas like DevOps environments that need protection from the top level down to the coding level. It even provides threat protection across multi-cloud environments, including Azure, AWS, and on-premise environments.<\/p>\n\n\n<h2>Copilot for Security<\/h2>\n\n\n<p>This one is perfect for those who are further along in their cloud journey and are ready to make the most of AI. It pairs fantastically with the previously mentioned products, but it shouldn\u2019t be thought of as a standalone solution, but rather as a string to the bow of cybersecurity professionals.<\/p>\n\n<p>When paired with products like Sentinel and Defender, Copilot for Security really sparkles. Studies show that security analysts who used <a href=\"https:\/\/www.windowscentral.com\/software-apps\/microsofts-security-copilot-is-helping-cyber-responders-be-73-more-accurate\">Security for Copilot with Sentinel were 44% more accurate across all tasks, which<\/a> demonstrates the impact it can have when it\u2019s in the right hands.<\/p>\n\n<p>We\u2019re only scratching the surface of what Copilot for Security is capable of here. Trained on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/13\/microsoft-copilot-for-security-is-generally-available-on-april-1-2024-with-new-capabilities\/\">78 trillion security signals<\/a>, it <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-security-copilot-blog\/microsoft-copilot-for-security-defender-threat-intelligence-and\/ba-p\/4114043\">delivers information about threat actors, indicators of compromise, and vulnerabilities<\/a> in an instant \u2013 empowering your cybersecurity staff and your organisation. If you\u2019re looking to learn more about <a href=\"https:\/\/clouddirect.net\/learning-hub\/an-introduction-to-microsoft-copilot-for-security\/\">Copilot for security then we wrote another blog earlier this month for you to check out.<\/a><\/p>\n\n\n<h2>Cloud Operating Model<\/h2>\n\n\n<p>Security products are all well and good when looking to stay secure in the cloud, but a solid foundation and a security blueprint are vital for long-term success. A Cloud Operating Model is a set of principles, practices, and processes designed to help you govern, manage, and protect your cloud estate.<\/p>\n\n<p>As we\u2019ve mentioned, 95 percent of all cyber security incidents can be traced to human error, but a Cloud Operating Model will identify the roles and responsibilities that allow you to hold members of your organisation accountable for security errors. It also lays the groundwork for upskilling your security team and providing improvements that will benefit your business in the long term.<\/p>\n\n<p>If you have been thinking about implementing a Cloud Operating Model but don\u2019t know where to start, we\u2019ve outlined seven considerations you should have for your Cloud Operating Model on our <a href=\"https:\/\/clouddirect.net\/learning-hub\/?sfid=90&amp;_sf_s=Cloud%20operating%20model\">Learning Hub<\/a>.<\/p>\n\n\n<h2>Working with a Managed Service Provider<\/h2>\n\n\n<p>The biggest issue with cybersecurity in general is staffing. It\u2019s an industry that is strained, and finding the right personnel is both a difficult and often long process, so this is where partnering with a Cloud Managed Service Provider can be key.<\/p>\n\n<p>The idea of outsourcing work can often put businesses off, but a Managed Service Provider can fill the gap of existing vacancies and has a range of other benefits too, from cost-effectiveness and in-depth expertise to around-the-clock availability.<\/p>\n\n<p>We understand that using a fully managed service isn\u2019t for everyone, but there are of course other ways to work with a Managed Service Provider. If you work with an Azure Expert MSP \u2013 like Cloud Direct, for example \u2013 then they might be able to gain you access to Microsoft funding pots that other partners don\u2019t, which could unlock exciting opportunities for your business and allow you to de-risk and accelerate your security and future cloud projects.<\/p>\n\n<p>If you\u2019re interested in learning more about some of the lesser-known benefits of partnering with a Cloud Managed Service Provider, then our CTO Paul Sells <a href=\"https:\/\/clouddirect.net\/learning-hub\/the-lesser-known-benefits-of-partnering-with-a-cmsp\/\">has got you covered<\/a>.<\/p>\n\n\n<h2>What\u2019s next in your security journey?<\/h2>\n\n\n<p>Now that you know how to stay secure in the cloud, what\u2019s next? It\u2019s all well and good having the information but what you do with it is key, Cloud Direct offers funded assessments and workshops that link to the aforementioned Sentinel, Defender, and Zero trust, if you\u2019re interested in exploring any of these options then <a href=\"https:\/\/clouddirect.net\/get-started\/?looking=5\">get in touch<\/a> with a member of our team and find out how you can add some sparkle to your cloud journey.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover six ways you can stay secure on your cloud journey.<\/p>\n","protected":false},"author":44,"featured_media":1512,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[35,31],"tags":[],"post_media_type":[24],"class_list":["post-1511","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-introduction-to-microsoft-365-security","category-microsoft-security","post_media_type-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Six ways to stay secure in the cloud - Learning Hub<\/title>\n<meta name=\"description\" content=\"Microsoft Cloud is complex, so it can at first seem tricky to figure out what to do next to stay secure. Here&#039;s six simple steps to follow.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Six ways to stay secure in the cloud\" \/>\n<meta property=\"og:description\" content=\"Microsoft Cloud is complex, so it can at first seem tricky to figure out what to do next to stay secure. Here&#039;s six simple steps to follow.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Hub\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-25T08:45:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-14T09:04:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2024\/04\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"abbieantoine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"abbieantoine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/\"},\"author\":{\"name\":\"abbieantoine\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"headline\":\"Six ways to stay secure in the cloud\",\"datePublished\":\"2024-04-25T08:45:06+00:00\",\"dateModified\":\"2025-04-14T09:04:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/\"},\"wordCount\":1323,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/04\\\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg\",\"articleSection\":[\"Introduction to Microsoft 365 Security\",\"Microsoft Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/\",\"name\":\"Six ways to stay secure in the cloud - Learning Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/04\\\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg\",\"datePublished\":\"2024-04-25T08:45:06+00:00\",\"dateModified\":\"2025-04-14T09:04:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"description\":\"Microsoft Cloud is complex, so it can at first seem tricky to figure out what to do next to stay secure. Here's six simple steps to follow.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/04\\\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/04\\\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/six-ways-to-stay-secure-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Six ways to stay secure in the cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\",\"name\":\"Learning Hub\",\"description\":\"Cloud Direct\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\",\"name\":\"abbieantoine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"caption\":\"abbieantoine\"},\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/author\\\/abbiefawcett\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Six ways to stay secure in the cloud - Learning Hub","description":"Microsoft Cloud is complex, so it can at first seem tricky to figure out what to do next to stay secure. Here's six simple steps to follow.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/","og_locale":"en_GB","og_type":"article","og_title":"Six ways to stay secure in the cloud","og_description":"Microsoft Cloud is complex, so it can at first seem tricky to figure out what to do next to stay secure. Here's six simple steps to follow.","og_url":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/","og_site_name":"Learning Hub","article_published_time":"2024-04-25T08:45:06+00:00","article_modified_time":"2025-04-14T09:04:19+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2024\/04\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"abbieantoine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"abbieantoine","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/"},"author":{"name":"abbieantoine","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"headline":"Six ways to stay secure in the cloud","datePublished":"2024-04-25T08:45:06+00:00","dateModified":"2025-04-14T09:04:19+00:00","mainEntityOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/"},"wordCount":1323,"commentCount":0,"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2024\/04\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg","articleSection":["Introduction to Microsoft 365 Security","Microsoft Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/","url":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/","name":"Six ways to stay secure in the cloud - Learning Hub","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#website"},"primaryImageOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2024\/04\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg","datePublished":"2024-04-25T08:45:06+00:00","dateModified":"2025-04-14T09:04:19+00:00","author":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"description":"Microsoft Cloud is complex, so it can at first seem tricky to figure out what to do next to stay secure. Here's six simple steps to follow.","breadcrumb":{"@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/#primaryimage","url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2024\/04\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg","contentUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2024\/04\/growtika-KPZNNKQbTMw-unsplash-scaled.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/clouddirect.net\/learning-hub\/six-ways-to-stay-secure-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clouddirect.net\/learning-hub\/"},{"@type":"ListItem","position":2,"name":"Six ways to stay secure in the cloud"}]},{"@type":"WebSite","@id":"https:\/\/clouddirect.net\/learning-hub\/#website","url":"https:\/\/clouddirect.net\/learning-hub\/","name":"Learning Hub","description":"Cloud Direct","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clouddirect.net\/learning-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28","name":"abbieantoine","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","caption":"abbieantoine"},"url":"https:\/\/clouddirect.net\/learning-hub\/author\/abbiefawcett\/"}]}},"_links":{"self":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/1511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/comments?post=1511"}],"version-history":[{"count":1,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/1511\/revisions"}],"predecessor-version":[{"id":2096,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/1511\/revisions\/2096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media\/1512"}],"wp:attachment":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media?parent=1511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/categories?post=1511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/tags?post=1511"},{"taxonomy":"post_media_type","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/post_media_type?post=1511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}