A Practical Guidebook to Securing the Cloud in Occasions of Crisis Some parts of this article is sourced from: threatpost.com