Knowing where your data is encrypted and who internally at the firm is monitoring cloud-based applications should be among the ‘must-know’ items on every General Partner’s cybersecurity readiness checklist. Rapid growth and agility gained by leveraging cloud applications also uncovers new threat vectors; the need to understand these potential security risks has never been more important.

In this article, you'll learn key questions to ask in-house or external IT support teams to ensure cloud applications are secure and reliable:

  • Does the architecture and solution set meet compliance and regulatory standards?
  • How does the solution set address data storage and encryption?
  • Have incident response and recovery plans been documented in the event of a data breach?