{"id":10307,"date":"2021-11-17T17:45:00","date_gmt":"2021-11-17T17:45:00","guid":{"rendered":"https:\/\/www.sage.com\/en-gb\/blog\/?p=10307"},"modified":"2026-01-29T09:32:59","modified_gmt":"2026-01-29T09:32:59","slug":"cybersecurity-cloud-cfo-need-to-know","status":"publish","type":"post","link":"https:\/\/www.sage.com\/en-gb\/blog\/cybersecurity-cloud-cfo-need-to-know\/","title":{"rendered":"Cybersecurity and the cloud: What CFOs need to know"},"content":{"rendered":"<header class=\"entry-header has-dark-background-color entry-header--has-illustration entry-header--has-illustration--generic\">\n\t<div class=\"container\">\n\t\t<div class=\"entry-header__row row align-center\">\n\t\t\t<div class=\"col col-lg-7 col-xlg-6 entry-header__content\">\n\t\t\t\t\t\t\t<div class=\"component component-single-header\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"entry-header__misc text--subtitle text--uppercase text--small\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.sage.com\/en-gb\/blog\/category\/technology-innovation\/\" class=\"entry-header__link\">Technology &amp; Innovation<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"entry-title-wrapper\">\n\t\t\t\t\t<h1 class=\"entry-title\">\n\t\t\t\t\t\tCybersecurity and the cloud: What CFOs need to know\t\t\t\t\t<\/h1>\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"entry-header__description\">\n\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t<div class=\"single-post-details container\">\n\t\t<div class=\"col\">\n\t\t\t<span class=\"posted-on \"><time class=\"entry-date published\" datetime=\"2021-11-17T17:45:00+00:00\">17 November, 2021<\/time><\/span><span class=\"reading-time\"> min read<\/span>\n\t\t<button\n\t\t\ttype=\"button\"\n\t\t\tclass=\"social-share-button button button--icon button--secondary js-social-share-button\"\n\t\t\tdata-share-title=\"Cybersecurity and the cloud: What CFOs need to know\"\n\t\t\tdata-share-url=\"https:\/\/www.sage.com\/en-gb\/blog\/cybersecurity-cloud-cfo-need-to-know\/\"\n\t\t\tdata-share-text=\"Please read this interesting article\"\n\t\t>\n\t\t\t<span class=\"social-share-button__share-label\">Share<\/span>\n\t\t\t<span class=\"social-share-button__copy-label\" hidden>Copy Link<\/span>\n\t\t\t<span class=\"social-share-button__copy-tooltip\" aria-hidden=\"true\" hidden>Copied<\/span>\n\t\t<\/button>\n\n\t\t\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\n\n<div class=\"wp-block-post-author has-dark-background-color alignfull\">\n\t<div class=\"container\">\n\t\t<div class=\"col\">\n\t\t\t\t\t\t\t<div class=\"co-authors\">\n\t\t\t\t\t\n\t\t<div class=\"entry-author-wrapper\">\n\t\t\t<a class=\"entry-author\" href=\"https:\/\/www.sage.com\/en-gb\/blog\/author\/asavinwattanajantra\/\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"40\" height=\"40\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2026\/03\/Asavin-350x350.jpg\" class=\"entry-author__image\" alt=\"Asavin\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2026\/03\/Asavin-350x350.jpg 350w, https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2026\/03\/Asavin-768x768.jpg 768w, https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2026\/03\/Asavin-810x810.jpg 810w, https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2026\/03\/Asavin.jpg 1000w\" sizes=\"auto, (max-width: 40px) 100vw, 40px\" \/>\t\t\t\t<span class=\"entry-author__name\">Asavin Wattanajantra<\/span>\n\t\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<p>Cybersecurity is the sole responsibility of the IT team. Wrong.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sage.com\/en-gb\/blog\/what-is-cybersecurity\/\">Cybersecurity<\/a> is everybody&#8217;s responsibility, especially as it&#8217;s people who can be weak links when it comes to securing your business. Whether you&#8217;re talking about phishing, malware or data leaks, it&#8217;s often the mistakes of people that causes problems.<\/p>\n\n\n\n<p>When it comes to cloud security, the problems don&#8217;t generally come with the technology\u2014cloud infrastructure can be at least as secure as enterprise data centres.<\/p>\n\n\n\n<p>Your issues will come if the cloud is poorly implemented, and adopted without securing your usage.<\/p>\n\n\n\n<p>Your people need to understand their responsibilities when using cloud infrastructure, while your business should adopt processes that protect users from themselves.<\/p>\n\n\n\n<p>Here&#8217;s what we cover in this article:<\/p>\n\n\n\n<p><a href=\"#challenges-anchor-link\">Challenges of remote working and cybersecurity<\/a><\/p>\n\n\n\n<p><a href=\"#why-anchor-link\">Why cybersecurity is an essential consideration for CFOs<\/a><\/p>\n\n\n\n<p><a href=\"#how-anchor-link\">How cloud tech can help to overcome cybersecurity challenges<\/a><\/p>\n\n\n\n<p><a href=\"#steps-anchor-link\">Steps for CFOs to start their cloud adoption journey<\/a><\/p>\n\n\n\n<p><a href=\"#final-anchor-link\">Final thoughts on cybersecurity and the cloud<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#gate-fef83a3c-4bd9-444d-99ce-fc924fb2be43\">Download your free copy of The digital CFO and discover why digitalisation should be your top priority<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"challenges-anchor-link\">Challenges of remote working and cybersecurity<\/h2>\n\n\n\n<p>With the massive increase of <a href=\"https:\/\/www.sage.com\/en-gb\/blog\/help-employees-work-from-home\/\">remote working<\/a> that resulted from the <a href=\"https:\/\/www.sage.com\/en-gb\/coronavirus\/\">coronavirus<\/a> pandemic, your security risks may have grown. Your employees are more likely to share data across personal computers and other devices, including financial data.<\/p>\n\n\n\n<p>Ideally, your business should have confidentiality policies, including advice on how employees should securely store documents.<\/p>\n\n\n\n<p>Sally-Ann Hall-Jones, CEO at Reality HR, says: &#8220;You may need to discuss with your IT provider whether the system is as secure for remote workers as it is when they are office-based.<\/p>\n\n\n\n<p>&#8220;Home broadband connections are often less secure than business-grade ones, so you may wish to consider the use of a Virtual Private Network [VPN].&#8221;<\/p>\n\n\n\n<p>However, some businesses may have cut corners in a hurry to provide employees access to remote work through the cloud.<\/p>\n\n\n\n<p>According to a survey of 500 UK finance professionals conducted by Sage, 64% said they prioritised ensuring flexible access to company systems over managing security concerns.<\/p>\n\n\n\n<p>Susan Cummings, CFO of DCSL GuideSmiths, a UK-based software developer, says: &#8220;When Covid happened, and people had to shift to working from home, security naturally slipped down the priority list.&#8221;<\/p>\n\n\n\n<p>Many businesses will continue with remote working, which means you&#8217;ll need security solutions that can adapt to a mobile workforce that depends on a suite of tools.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"why-anchor-link\">Why cybersecurity is an essential consideration for CFOs<\/h2>\n\n\n\n<p>With more financial processes running remotely through the cloud, as a CFO, you&#8217;ll need to support the development of security measures specifically for the finance function.<\/p>\n\n\n\n<p>A recent Gartner CFO survey found that nearly three out of four CFOs intended to shift at least 5% of previously on-site staff to permanent remote roles after coronavirus. Many of your finance processes already running remotely may have some of your company&#8217;s most sensitive information, such as customer and supplier financial data.<\/p>\n\n\n\n<p>You oversee some of the most valuable data in your organisation, so security should be a priority in everything you do. If your business gets hacked, and your customer data gets stolen, it might be on you to explain what happened and why there wasn&#8217;t enough money (or time) spent on getting your cloud systems secure.<\/p>\n\n\n\n<p>With finance teams particularly vulnerable to cyberattacks, anyone in the CFO role will want a firm understanding of new IT security issues, risks, and the legal frameworks involved.<\/p>\n\n\n\n<p>Alexander Bant, chief of research in the Gartner finance practice, says you shouldn&#8217;t <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/the-cfo-cybersecurity-risk-checklist\">ignore new security vulnerabilities<\/a>, but neither should you go it alone.<\/p>\n\n\n\n<p>He says: &#8220;CFOs especially need to collaborate with both IT and risk managers to make sure new cybersecurity risks stemming from the adoption of remote work don&#8217;t outpace the policies designed to protect vulnerable data.&#8221;<\/p>\n\n\n\n<p>Threats that CFOs should guard against when it comes to financial data include:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Phishing attacks<\/h3>\n\n\n\n<p>Phishing attacks are methods designed to trick employees into giving up sensitive financial information, usually by email, but can expand to voice calls and text messages.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Malware<\/h3>\n\n\n\n<p>Malware is a term used to describe malicious software, files or programs designed to harm and disrupt computers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Data leakage<\/h3>\n\n\n\n<p>Valuable financial data can leak through office and home internet connections using laptops, PCs, mobiles and tablets.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#gate-fef83a3c-4bd9-444d-99ce-fc924fb2be43\">Download your free copy of The digital CFO and discover why digitalisation should be your top priority<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-anchor-link\">How cloud tech can help to overcome cybersecurity challenges<\/h2>\n\n\n\n<p>Cloud solutions configured correctly can be more secure than on-premise solutions.<\/p>\n\n\n\n<p>Cloud providers typically guarantee the safety and security of their platforms and offer their users additional safety measures, such as password protection, encryption and access limitations based on user profiles.<\/p>\n\n\n\n<p>Users can also benefit from 24\/7 monitoring and dedicated cybersecurity teams trained to rapidly identify and respond to potential threats, reducing the impact.<\/p>\n\n\n\n<p>However, you should ensure that cloud providers are supporting your specific requirements.<\/p>\n\n\n\n<p>There are differences between cloud providers, big and small, so you should be prepared to ask hard questions about how they are protecting your data and infrastructure.<\/p>\n\n\n\n<p>Don&#8217;t simply put faith in what they say. They should at least provide evidence and case studies of the good work they may have done.<\/p>\n\n\n\n<p>Because remote working involves user-managed devices and remote access, don&#8217;t adopt cloud software without knowing exactly how users can access it, what they see, and how you can manage them.<\/p>\n\n\n\n<p>One of the enormous security benefits of cloud applications over on-premise solutions is the ease with which you can patch and upgrade software.<\/p>\n\n\n\n<p>With new threats constantly emerging, cloud providers only need to send one fix out to multiple users if there is a vulnerability. Users will always have the latest and most secure versions of the software.<\/p>\n\n\n\n<p>But remember, the cloud tech you use is only as secure as your people.<\/p>\n\n\n\n<p>If your employees leave out passwords publicly or click every link on their emails without thought, no technology will help. Train people up, educate them, and make sure they have a security-first mindset.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"steps-anchor-link\">Steps for CFOs to start their cloud adoption journey<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Identify your goals<\/h3>\n\n\n\n<p>Get a solid understanding of how cloud software will improve your business. If you&#8217;re looking to automate your financial processes, determine what processes will they be, and how much time will be saved.<\/p>\n\n\n\n<p>The more tangible the targets are, the more buy-in you can get from the rest of the company.<\/p>\n\n\n\n<p>Having measurable key performance indicators (KPIs) will help here.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Audit your existing infrastructure<\/h3>\n\n\n\n<p>It&#8217;s best if you understand which of your processes are working well before making mass changes.<\/p>\n\n\n\n<p>Implementing cloud software can be a complex process, so a good audit will help you prioritise your cloud initiatives and detemine which systems and apps you should migrate first, based on the amount of value they offer your business.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Communicate with your employees<\/h3>\n\n\n\n<p>Before you get buy-in, you need to let your finance team and the wider organisation know what the cloud will do for them.<\/p>\n\n\n\n<p>You need to communicate throughout the whole process. Remember that your employees play an essential part by following security best practices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Get the right support<\/h3>\n\n\n\n<p>You&#8217;ll need to speak to cloud providers and ask the right questions.<\/p>\n\n\n\n<p>What is their reputation for security and compliance? What kind of support will they give you?<\/p>\n\n\n\n<p>Work with senior management, IT teams and other departments to get what you need and consider getting external support to ensure you&#8217;re successful in the long term.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"final-anchor-link\">Final thoughts on cybersecurity and the cloud<\/h2>\n\n\n\n<p>Unfortunately, you may have heard a few security myths still making the rounds.<\/p>\n\n\n\n<p>One of them is that cloud systems are less secure than keeping your data on-site, which is quite an old school way of thinking. In the Sage research, 22% of non-cloud ready respondents say fears about compromised security are their biggest barrier to cloud adoption.<\/p>\n\n\n\n<p>Yes, when firms suffer breaches of customer data and sensitive business information, it does tend to be a big deal. But in most cases, it&#8217;s a failure of management and implementation by the business involved, which tends to be the problem.<\/p>\n\n\n\n<p>Moving your finance systems to the cloud will improve protection, while creating a more flexible work environment to support workers\u2014regardless of their location\u2014and help them avoid any mistakes that put their data and the business at risk.<\/p>\n\n\n\n<p><em>This content in its original form was paid for by Sage and produced in partnership with Longitude, a Financial Times company.<\/em><\/p>\n\n\n\n<div class=\"single-cta gated-content\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">The digital CFO<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p>CFOs, discover why digitalisation should be your top priority and see why investing in automation and the cloud will help your business stay ahead of the game.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"#gate-fef83a3c-4bd9-444d-99ce-fc924fb2be43\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>Download the report<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1440\" height=\"810\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1325899588-1440x810.jpg\" class=\"single-cta__image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1325899588-1440x810.jpg 1440w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n\n\n\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Subscribe to the Sage Advice newsletter<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p>Join more than 500,000 UK readers and get the best business admin strategies and tactics, as well as actionable advice to help your company thrive, in your inbox every month.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"#gate-b1a63862-3fa0-4a5e-bb67-c76b88bbc6b8\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>Subscribe now<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1440\" height=\"810\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1073797282-1-1440x810.jpg\" class=\"single-cta__image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1073797282-1-1440x810.jpg 1440w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>CFOs, learn how cloud technology can help to overcome cybersecurity challenges plus discover steps to take to start your cloud journey.<\/p>\n","protected":false},"author":356,"featured_media":9175,"menu_order":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sage_video":false,"post_featured_image_hide":false,"footnotes":""},"categories":[11],"tags":[51,159],"business_type":[3],"lilypad":[],"context":[],"industry":[],"persona":[68],"imagine_tag":[96],"coauthors":[351],"class_list":["post-10307","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-innovation","tag-cloud","tag-midsized-business","business_type-medium-sized-business"],"sage_meta":{"region":"en-gb","author_name":"Asavin Wattanajantra","featured_image":"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2021\/04\/GettyImages-614715418.jpg","imagine_tags":{"96":"Medium businesses"}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Sage Advice UK","distributor_original_site_url":"https:\/\/www.sage.com\/en-gb\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts\/10307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/users\/356"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/comments?post=10307"}],"version-history":[{"count":0,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts\/10307\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/media\/9175"}],"wp:attachment":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/media?parent=10307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/categories?post=10307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/tags?post=10307"},{"taxonomy":"business_type","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/business_type?post=10307"},{"taxonomy":"lilypad","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/lilypad?post=10307"},{"taxonomy":"context","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/context?post=10307"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/industry?post=10307"},{"taxonomy":"persona","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/persona?post=10307"},{"taxonomy":"imagine_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/imagine_tag?post=10307"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/coauthors?post=10307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}