{"id":15657,"date":"2023-12-18T03:37:11","date_gmt":"2023-12-18T03:37:11","guid":{"rendered":"https:\/\/www.trt.com\/?p=15657"},"modified":"2024-10-25T06:36:02","modified_gmt":"2024-10-25T06:36:02","slug":"what-are-the-security-risks-of-migrating-to-cloud","status":"publish","type":"post","link":"https:\/\/www.trt.com\/my\/what-are-the-security-risks-of-migrating-to-cloud\/","title":{"rendered":"What Are The Security Risks Of Migrating To Cloud?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<span style=\"font-weight: 400;\">Cloud migration refers to the process of moving digital assets, such as data, applications, and IT processes, from on-premise infrastructure or another cloud environment to a cloud computing platform. This transition is driven by various factors, including cost efficiency, scalability, accessibility, stability, and the desire to leverage advanced cloud services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The migration involves transferring and reconfiguring existing systems and data to operate within the cloud infrastructure. This may include moving virtual machines, databases, applications, and other business components to cloud-based servers and services.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3><b>Benefits of Migrating to the Cloud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Cloud migration offers several potential benefits, such as improved flexibility, scalability, and cost savings. It allows organizations to access computing resources on-demand, enabling them to scale their operations up or down based on fluctuating needs, without additional capital investments. It is a cost- effective way of allowing companies to choose from a software suite instead of purchasing programs one by one.\u00a0 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, cloud providers typically handle infrastructure maintenance and updates, relieving organizations of some operational burdens.<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;16761&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><em><span style=\"font-weight: 400;\">Migration does, however, present certain security risks. <\/span><\/em><\/h3>\n<h3 style=\"text-align: center;\"><em><span style=\"font-weight: 400;\">What are these security risks and how can we mitigate them?<\/span><\/em><\/h3>\n<p>[\/vc_column_text][vc_single_image image=&#8221;16436&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_column_text]<\/p>\n<h2><b>The Security Risks of Migrating To Cloud<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Successfully moving to the cloud requires careful planning as it is susceptible to security threats. When data is moved during migration, it becomes vulnerable to potential attacks. Additionally, at different stages of a migration project, attackers might gain access to unprotected development, testing, or production environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To strengthen your cloud migration strategy, it is crucial to foresee and address the following potential threats in advance:<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3><b>1. Data Loss<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">During the transfer of substantial company data from one location to another, there is always a potential risk of some information being lost. However, cloud migration introduces additional challenges, where technical issues or human error can contribute to data loss, corruption, or incomplete transfers.<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;16428&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;16766&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3>2. Application Programming Interfaces (APIs) vulnerabilities<\/h3>\n<p><span style=\"font-weight: 400;\">APIs act as communication channels between environments. They&#8217;re like bridges for data to move around, making them attractive targets for cybercriminals. This risk increases when open-source software is widely used, or when APIs lack proper authentication, leaving your company&#8217;s data wide open to anyone on the internet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To make your cloud migration safer, it&#8217;s crucial to ensure that APIs stay secure at every step. This means putting in strong measures to confirm and protect these communication channels. Doing so helps keep unauthorized access at bay and safeguards your data from potential breaches.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3><b>3. Misconfiguration<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Misconfiguration is one of the major concerns when it comes to Cloud migration due to the complexity of multi-cloud settings and the difficulty of manually identifying and correcting errors. This happens when the settings, permissions, or access controls aren&#8217;t set up correctly or are just kept at their default values. This might not sound like a big deal, but it can reveal sensitive information, give too much power to the wrong people, or unintentionally create security holes. It&#8217;s like leaving the front door unlocked.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Implementing effective security measures is crucial, involving the restriction of unnecessary ports and the strict limitation of access to authorized personnel only. This ensures a strong defense against potential risks arising from misconfigurations during cloud migration. <\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3><b>4. Ransomware<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ransomware is a type of malware that hackers use to lock a company&#8217;s computer systems, demanding payment\u2014usually in cryptocurrency\u2014to unlock them. Even though this threat has typically targeted regular computer storage, it can also impact cloud storage. If an attack occurs, it can lead to significant losses in both data and finances for a company.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To defend against this threat, the first step is to assess how likely your company is to be a target for such an attack. Once you have this understanding, you can establish strong defenses to keep your computer systems secure and be well-prepared to handle any potential ransomware issues.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3><b>5. Compliance Requirements<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">When moving to the cloud, new security needs arise. It&#8217;s crucial for companies to establish measures ensuring compliance, not just during the migration but also afterward. Neglecting this responsibility could lead to substantial fines and severe harm to a company&#8217;s reputation in the event of an unfortunate security incident. Therefore, maintaining a strong focus on meeting these security requirements is essential for a successful and secure transition to the cloud.<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;16440&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;16443&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3><b>6. Insider Threats<\/b><\/h3>\n<p>Apart from external threats like ransomware attacks, there are also security risks that originate within your company. Some of these stem from individuals trying to profit from malicious activities. However, equally common is the internal security threat resulting from simple human error during the data migration process.<\/p>\n<p>Quite understandably, many employees may not be up-to-date on the latest security measures to safeguard cloud data. This lack of awareness can lead to common mistakes, such as using weak passwords and neglecting encryption. These errors create easy entry points for cybercriminals into your system. To address this, it&#8217;s crucial to enhance internal awareness and training on security measures, minimizing the potential impact of human errors on your company&#8217;s cybersecurity.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Shifting your company&#8217;s operations to the cloud brings substantial advantages, such as increased productivity and cost savings. While this transition comes with some security risks, the key is understanding these risks to take the necessary steps in protecting your valuable data and system integrity.\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">To learn more about conducting a safe and secure migration to the cloud, book a FREE 30-minute call with us, so we can guide you and help ensure a smooth and secure cloud migration journey!<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"basel-button-wrapper text-center\"><a href=\"https:\/\/www.trt.com\/contact-us\/\" title=\"\" class=\"btn btn-color-alt btn-style-round btn-size-large\">Book FREE Consultation<\/a><\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Cloud migration refers to the process of moving digital assets, such as data, applications, and IT processes, from on-premise infrastructure<\/p>\n","protected":false},"author":14,"featured_media":16132,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15657","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud Migration Security Risks &amp; IT Solutions - TRT<\/title>\n<meta name=\"description\" content=\"Explore the security risks of migrating to the cloud with TRT. As a global IT provider, we offer solutions for hardware, software, and infrastructure needs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Migration Security Risks &amp; IT Solutions - TRT\" \/>\n<meta property=\"og:description\" content=\"Explore the security risks of migrating to the cloud with TRT. As a global IT provider, we offer solutions for hardware, software, and infrastructure needs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"TRT Shared Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trtsolutionslimited\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-18T03:37:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-25T06:36:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trt.com\/wp-content\/uploads\/2024\/07\/Untitled-design-1-1_19_11zon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"936\" \/>\n\t<meta property=\"og:image:height\" content=\"378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Winona Santiago\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Winona Santiago\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.trt.com\\\/sg\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/\"},\"author\":{\"name\":\"Winona Santiago\",\"@id\":\"https:\\\/\\\/www.trt.com\\\/#\\\/schema\\\/person\\\/1042f1fc67886eeb1d2c210894a70bac\"},\"headline\":\"What Are The Security Risks Of Migrating To Cloud?\",\"datePublished\":\"2023-12-18T03:37:11+00:00\",\"dateModified\":\"2024-10-25T06:36:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/\"},\"wordCount\":1204,\"publisher\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/sg\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.trt.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Untitled-design-1-1_19_11zon.jpg\",\"inLanguage\":\"en-MY\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.trt.com\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/\",\"url\":\"https:\\\/\\\/www.trt.com\\\/sg\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/\",\"name\":\"Cloud Migration Security Risks & IT Solutions - TRT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/sg\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/sg\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.trt.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Untitled-design-1-1_19_11zon.jpg\",\"datePublished\":\"2023-12-18T03:37:11+00:00\",\"dateModified\":\"2024-10-25T06:36:02+00:00\",\"description\":\"Explore the security risks of migrating to the cloud with TRT. As a global IT provider, we offer solutions for hardware, software, and infrastructure needs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/sg\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-MY\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.trt.com\\\/sg\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-MY\",\"@id\":\"https:\\\/\\\/www.trt.com\\\/sg\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.trt.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Untitled-design-1-1_19_11zon.jpg\",\"contentUrl\":\"https:\\\/\\\/www.trt.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Untitled-design-1-1_19_11zon.jpg\",\"width\":936,\"height\":378,\"caption\":\"A person in a hoodie gazes intently at two computer screens, immersed in their work or study.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.trt.com\\\/sg\\\/what-are-the-security-risks-of-migrating-to-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.trt.com\\\/my\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Are The Security Risks Of Migrating To Cloud?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.trt.com\\\/#website\",\"url\":\"https:\\\/\\\/www.trt.com\\\/\",\"name\":\"TRT Shared Services\",\"description\":\"A global leader in next-generation IT server, storage, and networking services.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.trt.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-MY\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.trt.com\\\/#organization\",\"name\":\"Total Risc Technology (TRT)\",\"url\":\"https:\\\/\\\/www.trt.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-MY\",\"@id\":\"https:\\\/\\\/www.trt.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.trt.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/colored-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.trt.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/colored-logo.png\",\"width\":300,\"height\":138,\"caption\":\"Total Risc Technology (TRT)\"},\"image\":{\"@id\":\"https:\\\/\\\/www.trt.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/trtsolutionslimited\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.trt.com\\\/#\\\/schema\\\/person\\\/1042f1fc67886eeb1d2c210894a70bac\",\"name\":\"Winona Santiago\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-MY\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b1515991b9c4ad4da98ccff978e0c23eb83779c7932a738b5103ec6926e76916?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b1515991b9c4ad4da98ccff978e0c23eb83779c7932a738b5103ec6926e76916?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b1515991b9c4ad4da98ccff978e0c23eb83779c7932a738b5103ec6926e76916?s=96&d=mm&r=g\",\"caption\":\"Winona Santiago\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Migration Security Risks & IT Solutions - TRT","description":"Explore the security risks of migrating to the cloud with TRT. As a global IT provider, we offer solutions for hardware, software, and infrastructure needs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Migration Security Risks & IT Solutions - TRT","og_description":"Explore the security risks of migrating to the cloud with TRT. As a global IT provider, we offer solutions for hardware, software, and infrastructure needs.","og_url":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/","og_site_name":"TRT Shared Services","article_publisher":"https:\/\/www.facebook.com\/trtsolutionslimited\/","article_published_time":"2023-12-18T03:37:11+00:00","article_modified_time":"2024-10-25T06:36:02+00:00","og_image":[{"width":936,"height":378,"url":"https:\/\/www.trt.com\/wp-content\/uploads\/2024\/07\/Untitled-design-1-1_19_11zon.jpg","type":"image\/jpeg"}],"author":"Winona Santiago","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Winona Santiago","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/#article","isPartOf":{"@id":"https:\/\/www.trt.com\/what-are-the-security-risks-of-migrating-to-cloud\/"},"author":{"name":"Winona Santiago","@id":"https:\/\/www.trt.com\/#\/schema\/person\/1042f1fc67886eeb1d2c210894a70bac"},"headline":"What Are The Security Risks Of Migrating To Cloud?","datePublished":"2023-12-18T03:37:11+00:00","dateModified":"2024-10-25T06:36:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trt.com\/what-are-the-security-risks-of-migrating-to-cloud\/"},"wordCount":1204,"publisher":{"@id":"https:\/\/www.trt.com\/#organization"},"image":{"@id":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trt.com\/wp-content\/uploads\/2024\/07\/Untitled-design-1-1_19_11zon.jpg","inLanguage":"en-MY"},{"@type":"WebPage","@id":"https:\/\/www.trt.com\/what-are-the-security-risks-of-migrating-to-cloud\/","url":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/","name":"Cloud Migration Security Risks & IT Solutions - TRT","isPartOf":{"@id":"https:\/\/www.trt.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trt.com\/wp-content\/uploads\/2024\/07\/Untitled-design-1-1_19_11zon.jpg","datePublished":"2023-12-18T03:37:11+00:00","dateModified":"2024-10-25T06:36:02+00:00","description":"Explore the security risks of migrating to the cloud with TRT. As a global IT provider, we offer solutions for hardware, software, and infrastructure needs.","breadcrumb":{"@id":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/#breadcrumb"},"inLanguage":"en-MY","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-MY","@id":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/#primaryimage","url":"https:\/\/www.trt.com\/wp-content\/uploads\/2024\/07\/Untitled-design-1-1_19_11zon.jpg","contentUrl":"https:\/\/www.trt.com\/wp-content\/uploads\/2024\/07\/Untitled-design-1-1_19_11zon.jpg","width":936,"height":378,"caption":"A person in a hoodie gazes intently at two computer screens, immersed in their work or study."},{"@type":"BreadcrumbList","@id":"https:\/\/www.trt.com\/sg\/what-are-the-security-risks-of-migrating-to-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trt.com\/my\/"},{"@type":"ListItem","position":2,"name":"What Are The Security Risks Of Migrating To Cloud?"}]},{"@type":"WebSite","@id":"https:\/\/www.trt.com\/#website","url":"https:\/\/www.trt.com\/","name":"TRT Shared Services","description":"A global leader in next-generation IT server, storage, and networking services.","publisher":{"@id":"https:\/\/www.trt.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trt.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-MY"},{"@type":"Organization","@id":"https:\/\/www.trt.com\/#organization","name":"Total Risc Technology (TRT)","url":"https:\/\/www.trt.com\/","logo":{"@type":"ImageObject","inLanguage":"en-MY","@id":"https:\/\/www.trt.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trt.com\/wp-content\/uploads\/2021\/12\/colored-logo.png","contentUrl":"https:\/\/www.trt.com\/wp-content\/uploads\/2021\/12\/colored-logo.png","width":300,"height":138,"caption":"Total Risc Technology (TRT)"},"image":{"@id":"https:\/\/www.trt.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trtsolutionslimited\/"]},{"@type":"Person","@id":"https:\/\/www.trt.com\/#\/schema\/person\/1042f1fc67886eeb1d2c210894a70bac","name":"Winona Santiago","image":{"@type":"ImageObject","inLanguage":"en-MY","@id":"https:\/\/secure.gravatar.com\/avatar\/b1515991b9c4ad4da98ccff978e0c23eb83779c7932a738b5103ec6926e76916?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b1515991b9c4ad4da98ccff978e0c23eb83779c7932a738b5103ec6926e76916?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b1515991b9c4ad4da98ccff978e0c23eb83779c7932a738b5103ec6926e76916?s=96&d=mm&r=g","caption":"Winona Santiago"}}]}},"_links":{"self":[{"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/posts\/15657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/comments?post=15657"}],"version-history":[{"count":43,"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/posts\/15657\/revisions"}],"predecessor-version":[{"id":16769,"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/posts\/15657\/revisions\/16769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/media\/16132"}],"wp:attachment":[{"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/media?parent=15657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/categories?post=15657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trt.com\/my\/wp-json\/wp\/v2\/tags?post=15657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}