CyberWatch

Troy Bowman | Securing the cloud

By

By

Access Point Consulting

Many small and mid-sized businesses assume that moving to the cloud means security is automatically handled by the provider. But as Troy Bowman, Senior Security Engineer, explains, that’s a dangerous misconception.

Defining Small and Midsize Business (SMB) Cybersecurity

Unlike large enterprises with dedicated security teams, SMBs often have limited security staff—sometimes just one IT professional juggling multiple responsibilities. This means security can become an afterthought rather than a strategic priority. “You can make all the money in the world, but if you’re not staffing your company to protect itself, can you really say you’re that large of an organization?” Troy asks.

The Cloud Isn’t a Security Cure-All

The shift to cloud computing doesn’t eliminate security concerns—it just changes them. Companies still need to worry about networking, DNS, patching vulnerabilities, and access controls—just as they would in a traditional data center.

And cloud providers don’t take on full responsibility for security. Instead, it depends on the service model:

  • Infrastructure-as-a-Service (IaaS) – Security responsibilities mostly fall on the customer.
  • Platform-as-a-Service (PaaS) – Some security responsibilities shift to the provider.
  • Software-as-a-Service (SaaS) – The provider handles more security, but customers must still assess risks.

Third-Party Risk: It’s More Than Just Your Vendor

Cloud security doesn’t stop at your immediate provider. Many SaaS vendors rely on third, fourth, or even fifth-party cloud providers. That means security failures could be outside your direct control. Troy recommends SMBs conduct due diligence, asking for third-party security attestations and ensuring vendors follow industry best practices.

Where SMBs Should Start

  • Understand your cloud model – Know your security responsibilities based on IaaS, PaaS, or SaaS.
  • Review contracts carefully – Pay attention to Service Level Agreements (SLAs) and uptime guarantees.
  • Follow cloud security frameworks – Resources like the Cloud Security Alliance (CSA) provide best practices.
  • Architect for security from the beginning – It’s easier to build security into a cloud environment than to fix gaps later.

“Start small,” Troy advises. “Have someone with strong cloud expertise help build a secure architecture before you scale.”

Listen to the CyberWatch podcast on Spotify and Apple Podcasts, or watch the episode on YouTube.

Resources

CyberWatch

April 2, 2025

Scott "Monty" Montgomery (Island) | Navigating CMMC compliance for organizations of every size

Scott Montgomery, known as Monty, joined the CyberWatch Expert Series podcast to discuss his extensive background in cybersecurity, particularly in building and designing network security tools for high-assurance environments like the Department of Defense (DoD) and the intelligence community. His experience includes significant tenure at McAfee (now Trellix), which led him to his current role at Island, where he focuses on innovative approaches to cybersecurity compliance.

Find out more
March 19, 2025

Michael Sviben (DomainGuard) | Defending against phishing and building proactive security awareness

Cybersecurity threats evolve rapidly, and one tactic consistently rises above the rest: phishing. In this episode of CyberWatch, Michael Sviben, co-founder of DomainGuard, discusses why phishing remains so effective, how businesses and individuals become targets, and what you can do to stay vigilant.

Find out more
March 5, 2025

David Habib (Brightspot) | Building a culture of cybersecurity awareness

Cybersecurity awareness is often reduced to check-the-box training, but David Habib, CIO at Brightspot, argues that real security awareness isn’t about formal programs—it’s about making security part of a company’s culture. In this episode, he shares practical insights on how organizations can move beyond stale training sessions to create an engaged and security-conscious workforce.

Find out more