top of page

Stop ignoring cyber risks in a hybrid IT world

A hybrid IT is a blend of cloud-based and on-premises IT services.

The pursuit of standardization used to be a best practice for building IT architecture, as IT organizations prefer to manage only one type of computing. Due to pressures from both the business and IT to shift toward cloud services, however, hybrid IT has become more and more prevalent. Organizations across the world are now increasingly moving towards a mix of platforms and infrastructures - balancing costs and speed efficiency with regulatory compliance and data governance - to transform IT into a broker of services.

Think about the cloud service your company currently uses -- Dropbox. This used to be provided by your IT organization through on-premises or home-grown applications, but they are now outsourced to cloud providers. Some smaller companies have also shifted toward a “cloud-first” approach for IT services, while others operate exclusively from the cloud. But most large enterprises have decades of IT investments that already work well. So, why replace it?

The word hybrid doesn’t come with a sense of positivity. For many, it could mean disruption and increased cyber risks for their organization and their digital business strategies.

Where is the increased cyber risks? 

For most organisations locally, their information security have been grossly underfunded, grossly under-resourced, heavily demanded in terms of their available capacity. Now we think about the cloud and the representation of risk from a hybrid IT standpoint. By joining the cloud services, who counts as their customers all these local organisations who are also grossly underfunded and under resource in their cyber resilience, you just took your organisation and added it with all other different organisations who are in the same situation. It is like 'admitting and checking yourself' voluntarily into an infectious ward in a hospital.

And if you are in that situation currently, be prepared for the possibility of the consequences of the breaches to be larger because it's now more than just you.  


bottom of page