If you haven’t played the new “Pokemon Go” game yourself, someone close to you definitely has. The game has gone viral since its release, and it has people out in droves wandering around neighborhoods looking for Pikachu.

Five Lessons From ‘Pokemon Go’

In the workplace, cloud apps such as “Pokemon Go” are wildly popular — and have been for a while. We all want to play, but CISOs must consider some general security requirements to be both efficient and safe.

Here are five requirements from “Pokemon Go” that can be applied to adopting cloud apps in your organization.

1. Visibility Is Essential

There are lots of Pokemon out there, but which ones are best for your needs? Having a good view of all the apps in use within your organization will not only help understand what needs your employees are looking to address, but also provide insight into where you might need to take corrective actions.

For every Blastoise, there are ten Magikarp. Pick the apps that address the right balance of functionality and corporate security requirements.

2. Connectivity Matters

Games are no fun if you have to enter a long, complex password every time you want to play. The same goes for cloud apps. You need to ditch the passwords in favor of a federated system that enables strong authentication but does not require employees to enter long passwords or write complicated ones down on sticky notes.

3. Policies Must Be Enforced

One of the great things about “Pokemon Go” is that it gets kids (and parents too) out of the house and active. This is great, but some rules have to be followed. You wouldn’t want your kids wandering around in strange neighborhoods or out all night.

This also applies to cloud app usage. Policies have to be in place to ensure apps are used within corporate guidelines, ensuring safety for both the employee and the organization.

4. Have a Mobile Strategy

Cloud apps such as “Pokemon Go” are designed to be used on mobile devices. When deploying cloud apps to the enterprise, you have to consider mobile devices as a primary platform. It requires the same security safeguards and user experience that your employees on laptops behind the firewall have.

5. Education Is the Best Defense

Educating your employees raises their combat power (CP) to defend against threats. The more employees know about appropriate app usage and the potential threats, the lower the chances of their being taken down by Charizard — or an easily defeated cyberthreat.

Remember, just like with “Pokemon Go,” the key to success is to stay active and vigilant. Taking an active security role makes cloud applications safer for everyone.

Accelerate your cloud evolution with IBM Security Cloud Enforcer

More from Cloud Security

How Posture Management Prevents Catastrophic Cloud Breaches

We've all heard about catastrophic cloud breaches. But for every cyberattack reported in the news, many more may never reach the public eye. Perhaps worst of all, a large number of the offending vulnerabilities might have been avoided entirely through proper cloud configuration. Many big cloud security catastrophes often result from what appear to be tiny lapses. For example, the famous 2019 Capital One breach was traced to a misconfigured application firewall. Could a proper configuration have prevented that breach?…

How to Implement Cloud Identity and Access Governance

Creating identity and access governance across cloud environments is crucial for modern organizations. In our previous post, we discussed how important human and non-human identities are for these environments and why their management and the governance of their access can be difficult. In the face of these challenges, our cloud identity and access governance (CIAG) approach offers an orchestration layer between cloud identity and access management (IAM) and enterprise IAM, as the following graphic shows. As we continue our CIAG…

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe. With vulnerabilities on the rise, the catastrophic impact of cloud breaches has made it clear that proper cloud security is of the utmost importance. And…