While most cloud vendors have standardized their approach to security, it's important for individual businesses to discuss who has access to their files and when they can access them.
"IT should press vendors on how their data is protected at all layers," Kennada says. "How are encryption keys managed? Are the right controls in place to prevent employees at the vendor site from unauthorized access?