Make sure your cloud server is protected from this
June 8, 2022
|
4
min read

Highlights
Does your business use a cloud server? 41% of businesses that were hacked say it was done through theirs. Here’s how to check your business is safe
Using a cloud server to drive your business’s technology is a smart idea. The benefits are huge!
You can use as little or as much storage as you need, without having to worry about limitations or huge bills. Perfect for growing businesses.
Your team can access any data anywhere. Cloud servers were made for the hybrid work world we have today.
And you don’t need to use lots of your office space to house big servers and other equipment.
But when you’re using a cloud server, you must make sure it’s properly secured.
A recent report has revealed cloud servers are increasingly being used as an entry point for cyber criminals to launch attacks.
A huge 41% of businesses that have been hacked revealed their cloud server was how cyber criminals got in.
Scarily, this figure is rising 10% year on year.
Why? Often, it’s because companies don’t invest as much into the security of their cloud servers as they should.
In technology as in life, you really do get what you pay for. Many of the free cloud servers available don’t provide the same level of security and encryption that paid-for services do. Often they are less reliable as well.
It’s vital that your business does full research when choosing a cloud server to make sure it meets all your requirements and is as safe as possible.
Better still, ask an expert to do this research for you (we can help).
We also recommend a few standard security measures are always followed.
Give all of your team a password manager to encourage them to generate separate long random passwords for every login they have.
The beauty of password managers is they’ll remember these passwords and even autofill the login boxes. That means better security and greater convenience in one package.
You should also provide regular cyber security training for everyone in your business. Business emails are the second most likely place an attack will start.
The first line of defence should always be a human asking themselves “wait, does this look right?”
It’s never possible to prevent 100% of attacks. But if you take all the right steps to keep your business safe your chances of suffering a successful attack go down dramatically.
If you’d like help choosing the right cloud server for your business, we can advise you – get in touch.
Tell us about yourself so we can serve you best.
Got a question?
More articles
.png)
This special edition of our Leading London series brings together the partners behind the rollout of the City of London Corporation’s new unified network, a major upgrade designed to strengthen public services and improve connectivity across the Square Mile and beyond.
The panel included:
- Sam Collins, Assistant Director of Digital and Data, City of London Corporation
- Chelsea Chamberlin, Chief Technology Officer, Roc Technologies
- Scott McKinnon, Chief Security Officer, Palo Alto Networks
- Rhod Morgan, Chief Operations Officer, Vorboss
- Elliot Townsend, Senior Director, Juniper Networks
- Christa Elizabeth Norton, Marketing Director, Roc Technologies
Together, they explored how the new network will improve public services, strengthen cyber resilience and support a more connected, future-ready City.

For many landlords and building managers, the word “wayleave” feels like the responsible route whenever a fibre circuit is being installed on their property. It sounds formal and safe – a neat legal box to tick.
In many cases, however, a wayleave adds unnecessary complexity and delays, frustrates tenants, and can expose landlords to long-term legal risks.
At Vorboss, we’ve connected thousands of office spaces across London without a wayleave, keeping landlords in full control and getting tenants online faster.

What is a wayleave?
A wayleave is a written agreement between a landowner and a telecoms operator. It gives the operator permission to install and keep equipment on private property.
What many people don’t realise is that signing a wayleave also activates “Code rights” under the Electronic Communications Code. These rights go beyond simple permission, they give the operator legal powers to stay on the property indefinitely, access it when needed, and even refuse removal of their equipment in certain situations.
For a typical connection into a commercial building in London, a wayleave can make the fibre installation process slower, more expensive, and limit the landlord’s flexibility long term.
Why a wayleave isn’t required for standard in-building fibre connections
For a standard in-building fibre connection serving a tenant, a wayleave isn’t a legal requirement. Important protections, like building access, fire safety, repairing any damage, and removing equipment, are already covered by the tenant’s lease and usual building rules.
If no wayleave is signed, no Code rights are triggered, meaning the landlord retains full control and the installation exists under a simple, fully revocable licence.
In practice, this gives landlords far more protection and flexibility:
- No legal lock-in – the telecoms operator has no long-term rights to stay or refuse removal.
- Landlords keep full control – equipment can be moved or removed when the building changes.
- Faster fibre installation – no time lost in drafting contracts or solicitor reviews.
- Happier tenants – connections go live quicker; tenants get to move in faster.
By contrast, signing a wayleave and granting Code rights introduces a complex and expensive legal process for any fibre removal or relocation. This can take at least 18 months, plus potential court or tribunal proceedings, making it slower, and far less flexible for the landlord.
.avif)

.avif)

