Skip main navigation

New offer! Get 30% off your first 2 months of Unlimited Monthly. Start your subscription for just £29.99 £19.99. New subscribers only. T&Cs apply

Find out more

Introduction to Cloud Computing and Cloud Security

.
9.2
STEVE SHARMA: When I’m working with the number of our government and enterprise customers. So one of the customer, government customer will experience wannacry, which is called the Battier wannacry attack incident. The end-user computer, all the screens, and everything will be locked with encryption code and it will ask for some ransomware, which is called, let’s say, it’s kind of ransomware that asks for money and, the data and the access being locked by a malicious user from the cloud. The government was, been panicked and there was a two days of shutdown for a number of key services, in the health department of one of the state.
49.9
And, it was an eyeopener for the government as well, to practice cybersecurity and look for the more deeper cloud steady controls. If the government agency is using, some of the cloud-based applications or the cloud services, whether in form of infrastructure as a service or platform as a service or just as an applications, or softwares as a service.
This article is from the free online

Introduction to Digital Transformation: Understand and Manage Digital Transformation in the Workplace

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now