Why The Cloud Is As Secure As Your PC

Why the Cloud Is As Secure

Recently, a great portion of hype in the technology sector is related to cloud computing security and reliability. Recent service interruptions experienced by leading cloud services providers like Amazon, in combination with security issues and credential leaks that occurred in services delivered by Sony and Google’s Android operating systems raised questions about the overall security and safety of cloud-based solutions.

There is no simple or straightforward answer to the question whether the Cloud is a secure place for storing data, conducting transactions and maintaining corporate databases. Moreover, one should distinguish between private, public and hybrid clouds used to store corporate data run business applications. Most security experts agree that cloud-based solutions are as secure as offline software and storage products and services that run in a corporate environment, on a corporate server and are isolated from external networks.

Actually, a private cloud i.e. most clouds deployed by enterprises, small and large ones alike, can experience downtime as often as public clouds like those offered by Google and Amazon, for example. Private, public and hybrid clouds utilize infrastructure, hardware and software that is similar to the ones used in corporate private networks; therefore, IT specialists face the same problems in a “traditional” and a cloud environment. Over 200,000 Google’s Gmail users saw their email accounts emptied in a day, loosing emails and other documentation they archived for years. However, corporate users could experience the same troubles should a company server crash, deleting data stored in their corporate email accounts. No one is insured against hardware faults and Google later admitted that the mysterious loss of data occurred due to a combination of hardware and software faults.

The human factor should not be underestimated, too.

Government agencies around the world avoid using cloud services offered by corporate providers because of the risks related to data leaks and data protection in the Cloud. Actually, most reputable providers of cloud services apply strict data and software access policies similar to those implemented by government bodies. On the other hand, data leaks within the government-run companies and agencies occur more frequently than information leaks originating from corporations. If an American sergeant managed to transfer sources to Wikileaks, thousands of classified government cables stored within the U.S. Army computer networks, one should bet that the same can happen to myriads of files and emails stored in public cloud services. The greatest danger is related to targeted attacks and business espionage while individual users should beware mostly of identity theft.

Reliability of cloud services is another issue that should be taken into account. A growing number of providers offer cloud services and products while Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) are now commonly used to reduce corporate costs. Other enterprises rely on Infrastructure-as-a-Service to run their business but in all these scenarios business depends on external resources to run smoothly their everyday operations.

Thus, reliability of cloud products and services is now a major issue while many IT specialists admit they are not convinced in the reliability of cloud solutions deployed within their respective organizations. For example, an enterprise greatly reduces its software licensing fees and payroll costs by deploying a cloud software platform but such a solution can cost dearly if the PaaS provider does not offer an acceptable reaction time in case of malfunctions and service faults.

Once again, the same troubles can occur in a “traditional” software environment where a platform is not supported in an appropriate manner or a company lacks experienced IT staff. Connection and processing speed is also a concern when the issue in hand is cloud computing but this can be subject to a separate article.

In reality, the Cloud is as secure and safe as is a personal computer connected to a closed corporate network, provided that the network is maintained by well-trained specialists and all available and applicable security and safety measures are implemented. No complete security is available in an interconnected environment where practically all devices and gadgets are able to connect to a sort of network.

Apart from imperfections offered by software and hardware, the human factor is still the main threat to security and safety in the Cloud.

By Kiril Kirilov

Sorry, comments are closed for this post.

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…