{"id":901,"date":"2018-07-11T07:00:23","date_gmt":"2018-07-11T07:00:23","guid":{"rendered":"https:\/\/www.ringcentral.com\/small-business\/blog\/?p=901"},"modified":"2024-07-23T07:47:09","modified_gmt":"2024-07-23T14:47:09","slug":"cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2","status":"publish","type":"post","link":"\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/","title":{"rendered":"Cloud security and mobility: how safe are you in the cloud?"},"content":{"rendered":"<p>The cloud has become a staple in both consumer and business technology. It\u2019s funny how some people don\u2019t know what the cloud is while actually using it in their daily lives. After all, if you\u2019re using social media sites like Facebook<sup>\u00ae<\/sup> and Twitter or sending email through Gmail<sup>\u2122<\/sup> or Yahoo Mail, you\u2019re automatically using the cloud. Where do you think all that information is stored? Certainly not on your computer.<\/p>\n<p>Same goes for businesses. A lot of the most popular business apps, like Google\u2019s Google Workspace or Microsoft<sup>\u00ae<\/sup> Microsoft 365<sup>\u2122<\/sup>, are cloud-based. Our very own RingCentral takes pride in being the industry leader in providing cloud business communications solutions.<\/p>\n<h2><strong>What is the cloud?<\/strong><\/h2>\n<p>For context, the term \u201ccloud\u201d refers to the remote network or data center used to store files or host services, which are then delivered to different devices through the internet. RingCentral, for example, has multiple data centers across the US where the service is hosted.<\/p>\n<figure id=\"attachment_906\" aria-describedby=\"caption-attachment-906\" style=\"width: 597px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-medium wp-image-906\" src=\"https:\/\/www.ringcentral.com\/small-business\/blog\/wp-content\/uploads\/What-is-the-cloud-597x400.jpg\" alt=\"what is the cloud\" width=\"597\" height=\"400\" \/><figcaption id=\"caption-attachment-906\" class=\"wp-caption-text\">The &#8220;cloud&#8221; refers to the remote network used to store files and host services, which are then delivered via the Internet<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Companies that are subscribed to RingCentral are able to access and use their<a href=\"https:\/\/www.ringcentral.com\/office\/how-it-works.html\"> cloud-based phone system<\/a> through internet-connected devices, like <a href=\"https:\/\/www.ringcentral.com\/what-is-a-voip-phone.html\">IP phones<\/a>, smartphones, tablets, and desktop and laptop computers.<\/p>\n<h2><strong>Cloud computing security issues and challenges<\/strong><\/h2>\n<p>While we\u2019re now used to the technology, it doesn\u2019t change the fact that companies are essentially entrusting sensitive information to third-party providers. In addition, the information also travels through the public internet where it\u2019s at risk of being intercepted.<\/p>\n<p>In an article back in January, CSO from IDG enumerated the<a href=\"https:\/\/www.csoonline.com\/article\/3043030\/security\/12-top-cloud-security-threats-for-2018.html\" rel=\"nofollow\"> top 12 cloud security threats for 2018<\/a>. It includes security risks such as data breaches and data loss as well as inadequate identity, credential, and access management.<\/p>\n<h2><strong>How secure is the cloud?<\/strong><\/h2>\n<p>While there are security risks, <a href=\"https:\/\/www.forbes.com\/sites\/quora\/2017\/09\/18\/cloud-storage-is-much-more-secure-than-you-think\/#67785ff17403\" rel=\"nofollow\">the cloud is actually much more secure than you think<\/a>. A lot of the security issues are associated with cloud services that are what you can call less than reputable.<\/p>\n<figure id=\"attachment_907\" aria-describedby=\"caption-attachment-907\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-medium wp-image-907\" src=\"https:\/\/www.ringcentral.com\/small-business\/blog\/wp-content\/uploads\/How-secure-is-the-cloud-600x400.jpg\" alt=\"How secure is the cloud\" width=\"600\" height=\"400\" \/><figcaption id=\"caption-attachment-907\" class=\"wp-caption-text\">The cloud is actually much more secure than most local business networks<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>But if you\u2019re dealing with the top providers in the cloud game like Microsoft, Google, and RingCentral, then you\u2019re more or less safe (though in the field of IT security, no system is 100% secure).<\/p>\n<p>As the top names in the industry, it\u2019s their business to make their cloud system as secure as possible. After all, their reputation is at stake here.<\/p>\n<h2><strong>What security information do you need your cloud solutions provider to provide?<\/strong><\/h2>\n<p>Reputable or not, <a href=\"https:\/\/www.perimeter81.com\/glossary\/cloud-network-security\">cloud security<\/a> should always be a priority especially when you\u2019re entrusting sensitive data and business processes to a third-party cloud provider.<\/p>\n<p>Even if the cloud provider has a good reputation for security, it still pays to know how exactly they are keeping your data safe.<\/p>\n<p>That is why you should be diligent in finding out as much as you can about the types of security measures and policies the cloud services you\u2019re considering are implementing to make sure their systems are secure.<\/p>\n<p>Ask your cloud solutions providers about:<\/p>\n<ul>\n<li><u>Multi-factor authentication<\/u>\u2014Your provider of choice should, at the very least, employ this. It\u2019s a method of confirming user identity through two or more authenticating factors, which could include something they know, something they have, and\/or something they are. Some providers also implement this in combination with a <a href=\"https:\/\/www.ringcentral.com\/office\/features\/single-sign-on\/overview.html\">Single Sign-on feature<\/a> to avoid user login fatigue.<\/li>\n<li><u>Redundancy<\/u>\u2014Most cloud service providers store at least three copies of the same data on different servers. These can even be stored in different data centers. This should make the possibility of data loss very, very low.<\/li>\n<li><u>Multiple data centers<\/u>\u2014This is related to redundancy. Top cloud providers not only have multiple servers, they also employ multiple data centers across the globe. If one data center is compromised, other data centers can and take over.<\/li>\n<li><u>Data encryption<\/u>\u2014There are numerous regulations (state, federal, industry) focused on the protection of data while they\u2019re in storage and in transmission. While it\u2019s not directly stated that encryption is a requirement for compliance, it\u2019s still the best way to meet those standards. Make sure that your cloud provider employs high-level encryption on all transmission endpoints.<\/li>\n<li><u>Physically secure data centers<\/u>\u2014The data centers of the top cloud providers are not only secure against cyberattacks, they are also very physically secure. It\u2019s so secure that its security can rival some government and financial institutions.<\/li>\n<li><u>Account administration and user management<\/u>\u2014Understand the extent of account administration and user access control provided by the provider. The company and its administrators should have the power to grant, revoke, or demote access per user.<\/li>\n<\/ul>\n<figure id=\"attachment_908\" aria-describedby=\"caption-attachment-908\" style=\"width: 695px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-medium wp-image-908\" src=\"https:\/\/www.ringcentral.com\/small-business\/blog\/wp-content\/uploads\/Physically-secure-data-centers-695x243.jpg\" alt=\"Physically secure cloud data center\" width=\"695\" height=\"243\" \/><figcaption id=\"caption-attachment-908\" class=\"wp-caption-text\">Cloud data centers are not only secure against cyber attacks but against physical intrusions as well.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Aside from these, you should also ask the cloud provider about standards they\u2019ve met and certificates they\u2019ve acquired to give credence to their cloud security strategy and policies. RingCentral, for their part, has the following:<\/p>\n<ul>\n<li>Encryption of data-at-rest meets the compliance requirements and standards of the following:\n<ul>\n<li>US Health Insurance Portability and Accountability Act (HIPAA)<\/li>\n<li>EU General Data Protection Regulation (GDPR)<\/li>\n<li>Payment Card Industry Data Security Standard (PCI DSS)<\/li>\n<li>Secure Statement on Standards for Attestation Engagements (SSAE) 16, Service Organization Controls (SOC) 2, and SOC 3 compliant data center with monthly audits<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>You also have to check if the cloud solutions provider has fraud prevention measures against risks like credentials theft or toll fraud. The system should have built-in service layer fraud protection and monitoring for possible anomalies. It would also help if the provider is continuously promoting best practices against fraud to their subscribers.<\/p>\n<p>Finally, since you\u2019re already being this diligent, verify if the information you were able to get is actually practiced by the provider. Talk to some of their existing customers to see if what they provide is just lip service or if they\u2019re able to actually back up their talk.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cloud has become a staple in both consumer and business technology. It\u2019s funny how some people don\u2019t know what the cloud is while actually using it in their daily lives. After all, if you\u2019re using social media sites like Facebook\u00ae and Twitter or sending email through Gmail\u2122 or Yahoo Mail, you\u2019re automatically using the &#8230;<\/p>\n","protected":false},"author":845,"featured_media":903,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23732],"tags":[],"class_list":["post-901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cloud Security and Mobility: How Safe Are You in the Cloud?<\/title>\n<meta name=\"description\" content=\"Cloud computing does have security risks, but is it any more dangerous than other systems? Find out how cloud security is handled by top cloud providers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud security and mobility: how safe are you in the cloud?\" \/>\n<meta property=\"og:description\" content=\"Cloud computing does have security risks, but is it any more dangerous than other systems? Find out how cloud security is handled by top cloud providers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-11T07:00:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-23T14:47:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/08\/web_home_HOME_def.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mark Dacanay\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Dacanay\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/\"},\"author\":{\"name\":\"Mark Dacanay\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/764fd7eae6ea91087a1925b0fd6e413d\"},\"headline\":\"Cloud security and mobility: how safe are you in the cloud?\",\"datePublished\":\"2018-07-11T07:00:23+00:00\",\"dateModified\":\"2024-07-23T14:47:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/\"},\"wordCount\":1030,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/\",\"name\":\"Cloud Security and Mobility: How Safe Are You in the Cloud?\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2018-07-11T07:00:23+00:00\",\"dateModified\":\"2024-07-23T14:47:09+00:00\",\"description\":\"Cloud computing does have security risks, but is it any more dangerous than other systems? Find out how cloud security is handled by top cloud providers.\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud security and mobility: how safe are you in the cloud?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/764fd7eae6ea91087a1925b0fd6e413d\",\"name\":\"Mark Dacanay\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e7cb3062d3a00d7462ac44270f633bdc726cf1a75143c900410000de51797421?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e7cb3062d3a00d7462ac44270f633bdc726cf1a75143c900410000de51797421?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e7cb3062d3a00d7462ac44270f633bdc726cf1a75143c900410000de51797421?s=96&d=mm&r=g\",\"caption\":\"Mark Dacanay\"},\"description\":\"Mark Dacanay is a Digital Marketing Professional who has been working with a B2B company offering cloud-based phone systems for more than 5 years. He is obsessed with anything about the cloud \u2013 the technology, not the fluffy stuff in the sky.\",\"url\":\"\/us\/en\/blog\/author\/mark-dacanay\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud Security and Mobility: How Safe Are You in the Cloud?","description":"Cloud computing does have security risks, but is it any more dangerous than other systems? Find out how cloud security is handled by top cloud providers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/","og_locale":"en_US","og_type":"article","og_title":"Cloud security and mobility: how safe are you in the cloud?","og_description":"Cloud computing does have security risks, but is it any more dangerous than other systems? Find out how cloud security is handled by top cloud providers.","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2018-07-11T07:00:23+00:00","article_modified_time":"2024-07-23T14:47:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/08\/web_home_HOME_def.png","type":"image\/png"}],"author":"Mark Dacanay","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"Mark Dacanay","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#article","isPartOf":{"@id":"\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/"},"author":{"name":"Mark Dacanay","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/764fd7eae6ea91087a1925b0fd6e413d"},"headline":"Cloud security and mobility: how safe are you in the cloud?","datePublished":"2018-07-11T07:00:23+00:00","dateModified":"2024-07-23T14:47:09+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/"},"wordCount":1030,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#primaryimage"},"thumbnailUrl":"","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/","name":"Cloud Security and Mobility: How Safe Are You in the Cloud?","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#primaryimage"},"thumbnailUrl":"","datePublished":"2018-07-11T07:00:23+00:00","dateModified":"2024-07-23T14:47:09+00:00","description":"Cloud computing does have security risks, but is it any more dangerous than other systems? Find out how cloud security is handled by top cloud providers.","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud security and mobility: how safe are you in the cloud?"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/764fd7eae6ea91087a1925b0fd6e413d","name":"Mark Dacanay","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e7cb3062d3a00d7462ac44270f633bdc726cf1a75143c900410000de51797421?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e7cb3062d3a00d7462ac44270f633bdc726cf1a75143c900410000de51797421?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e7cb3062d3a00d7462ac44270f633bdc726cf1a75143c900410000de51797421?s=96&d=mm&r=g","caption":"Mark Dacanay"},"description":"Mark Dacanay is a Digital Marketing Professional who has been working with a B2B company offering cloud-based phone systems for more than 5 years. He is obsessed with anything about the cloud \u2013 the technology, not the fluffy stuff in the sky.","url":"\/us\/en\/blog\/author\/mark-dacanay\/"}]}},"rc_img_url":null,"rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/mark-dacanay\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/e7cb3062d3a00d7462ac44270f633bdc726cf1a75143c900410000de51797421?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">Mark Dacanay<\/span><\/a>","rc_author_full_name":"Mark Dacanay","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/01\/r-logo-v2022.svg","rc_author_link":"\/us\/en\/blog\/author\/mark-dacanay\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/security\/amp\">Security<\/a>","amp_link":"\/us\/en\/blog\/cloud-security-and-mobility-how-safe-are-you-in-the-cloud-2\/amp","excerpt_title":"Cloud security and mobility: how safe are you in the cloud?","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/845"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=901"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/901\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}