Cybercriminals try to hack into corporate cloud services every day – an expert shares nine steps to secure your data
Cloud services are becoming an increasingly common part of corporate daily life, and will become even more widespread over the coming years. Yet the security of these services is constantly being tested, and criminals are looking for ways to gain access to data in cloud every day. Kaapro Kanto, Vice President, Network & Cloud at DNA Corporate Business, lists the most common mistakes that lead to data in cloud being compromised – as well as nine steps to safeguard against security threats.

Cloud services enable easy access to data and applications from anywhere, the fast and flexible scaling of resources, and cost savings. Yet in recent years, a number of cases have emerged in which corporate data has been compromised. Is it safe to use cloud services?
Kaapro Kanto, Vice President, Network & Cloud at DNA Corporate Business, says that the cloud is fundamentally an excellent and secure solution for managing a company's data, as long as it is used correctly. For example, a costly mistake can be made at the service selection stage.
“For me, it’s a clear red flag if the service provider doesn’t specify how security will be implemented in the service as a whole, or what industry standards it meets. If the overall picture is not clear or the provider cannot provide a comprehensive security description, I would keep looking for another service provider,” says Kanto.
Kanto also highlights another problem: when a company does not have a standardised process for procurement and management of its services. In other words, there is no holistic plan how various services integrate into a cohesive architecture.
“Unfortunately, you often see all kinds of point solutions in which the same features have in fact been acquired several times via different services. But they’ve simply not been widely adopted and integrated into the company’s cloud architecture. Each new service must be carefully protected, and users must be trained to use them in a way that does not compromise security,” says Kanto.
Nine steps to safer cloud services
Cloud service providers invest heavily in security and often offer advanced solutions to safeguard their own services. It is vital to deploy these solutions when procuring services. A euro saved on a service licence can easily cost more in the form of higher risks due to inadequate controls. In order to get the basics right, Kanto lists nine things to consider when introducing cloud computing:
- Risk management: It is important to identify and assess the risks associated with cloud services and specify how you will manage them. For example, does your company have data that can be exported to the cloud or does it depend on cloud operations and connectivity?
- Assess the service provider: It’s worth choosing a reliable cloud service provider from the outset – one that adheres to strict security standards and offers comprehensive security solutions. Before choosing a service, you should check the service provider's data security practices to ensure that they meet all the requirements and industry standards.
- Access management: You must be aware of how a cloud service’s user data is linked to your company’s business processes, and ensure that multi-factor authentication is implemented for all users.
- Online safety: Even if the services are located in the cloud, you should ensure that access is restricted to corporate network solutions. This increases the security of the service by reducing the attack surface. When connections to services are made through a corporate network, it reduces the chance of criminal attacks.
- Logging and monitoring: The cloud service must implement comprehensive logging practices, and this log should also be monitored. Monitoring will enable you to detect any irregularities early on, before they have a chance to cause significant damage to the company.
- Information security principles: It is important to establish and maintain clear security policies that cover all aspects of cloud security. This includes access rights management, data encryption, access monitoring and regular information security audits.
- Training and raising awareness: Employees should receive preemptive training so that they can identify and avoid security threats such as phishing and malware. It is also important to raise employees’ awareness of potential threats, so they will know the correct action to take.
- Backups and recovery plans: In order to minimise risks, it is a good idea to perform regular backups and ensure that your recovery plans are up to date. This will help you to recover your data quickly in the event of data loss or an attack.
- Contracts: Up-to-date contracts with clearly defined roles and responsibilities are also important in cloud computing. They ensure that information security is implemented by the right people. It is also important for these contracts to specify how use of a service will be terminated, in which case the data will be transferred and then deleted from the service.
Media enquiries:
Kaapro Kanto, Vice President, Network & Cloud, DNA Plc, tel. +358 (0)40 059 9020, kaapro.kanto@dna.fi
DNA Corporate Communications, tel. +358 44 044 8000, communications@dna.fi
Images
DNA is one of the leading telecommunications companies in Finland. Our purpose is to connect you to what matters most. We offer connections, services and devices for homes and workplaces, contributing to the digitalisation of society. Already for years, DNA customers have been among the world leaders in mobile data usage. DNA has about 3.7 million subscriptions in its fixed and mobile communications networks. The company has been awarded numerous times as an excellent employer and family-friendly workplace. In 2024, our total revenue was EUR 1,100 million and we employ about 1,600 people around Finland. DNA is a part of Telenor Group, a leading telecommunications company across the Nordics. More information: www.dna.fi, Facebook @DNA.fi, Instagram and Threads @dna_fi and LinkedIn @DNA-Oyj.
Alternative languages
Subscribe to releases from DNA Oyj
Subscribe to all the latest releases from DNA Oyj by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from DNA Oyj
Tutkimus: Moni pitää älylaitteiden omaa tietoturvaa riittävänä, vaikka se ei tarjoakaan riittävää suojaa2.7.2025 08:30:00 EEST | Tiedote
Suomalaiset kokevat tietoturvan entistä tärkeämmäksi ja kaikkia koskettavaksi asiaksi. Samalla yhä useampi jättää älylaitteensa suojaamatta tietoturvauhilta ja kokee tietoturvaratkaisut kalliiksi, selviää DNA:n teettämästä Digitaalinen elämä -kyselytutkimuksesta. Noin kolmasosa (35 %) suomalaisista luottaa siihen, että laitteiden oma tietoturva on riittävä. Asiantuntija pitää tätä huolestuttavana, sillä älylaitteiden tietoturva ei itsessään ole tarpeeksi kattava.
Survey: Many consider their smart devices' security sufficient, even though it does not provide adequate protection2.7.2025 08:30:00 EEST | Press release
Finns view cybersecurity as a topic that is increasingly important and universal. However, more individuals leave their smart devices unprotected against security threats, feeling that security solutions are too expensive, according to DNA’s Digital Life 2025 survey. Approximately one-third (35%) of Finns trust that their devices' built-in security is sufficient. This is concerning, as the security of smart devices alone is not comprehensive enough.
DNA:n kesäkuun 2025 myydyimmät puhelimet, älykellot ja tietokoneet1.7.2025 08:00:00 EEST | Tiedote
Apple vei kärkipaikan sekä DNA:n kuluttaja- että yritysasiakkaiden myydyimpien puhelinten listalla iPhone 16 Pro 5G -mallillaan. Applen iPhone 13 5G säilytti puolestaan ensimmäisen sijan käytettyjen puhelinten listalla. Kesäkuun myydyimpien älykellojen kärkisijat menivät lasten kellopuhelimille. Myydyimpien tuotteiden kärkeen kiilasi Xplora XGO2 -kellopuhelin, ja listan toiselle sijalle nousi ZTE K1 Pro -kellopuhelin. Toisen kvartaalin myydyimmän tietokoneen paikan otti Applen MacBook Air 13" M2.
Puhelimen katoamiseen kannattaa varautua jo ennakolta – tee ainakin nämä toimet uudelle puhelimelle27.6.2025 11:54:39 EEST | Tiedote
Välillä sattuu ja tapahtuu – puhelimille siis. Jos puhelin katoaa tai varastetaan, uuden laitteen saa tilalle, mutta sen sisältämien tietojen päätyminen vääriin käsiin voi aiheuttaa ongelmia. Onneksi tilanteeseen voi varautua ennakolta, jolloin vahingot jäävät pienemmiksi.
Be prepared in case your phone is lost – do at least these steps for your new phone27.6.2025 11:54:39 EEST | Press release
Accidents happen, and your phone is no exception. If a phone is lost or stolen, you can get a new replacement, but information stored in your phone ending up in the wrong hands can cause problems. Fortunately, you can take steps to minimise the damage caused by this in advance.
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom