HP ‘Master The Cloud’ Event (Toronto) – Part 2

HP ‘Master The Cloud’ Event (Toronto) – Part 2

HP ‘Master The Cloud’ Event (Toronto) – Part 2

Here’s an interesting parallel, one somewhat removed from the busy world of cloud computing. In the world of “people,” social psychologists who specialize in generational issues are starting to refer to the most recent generation of kids coming-of-age as the Purell generation, since they are likely to be aware of every hand sanitizer bottle or station in their homes, schools, and favourite stores.

This thought came to me as I observed a breakout session on cloud security at the HP Master The Cloud conference, in which the presenter discussed the principle of practicing good IT hygiene. Good IT hygiene. That’s a great term to help get the concept of cloud security across to executives and others who are not comfortable with standard IT terms.

While businesses and organizations wrestle with their fears of moving to the cloud, the security analysts at HP reminded the audience that last year 1773 Exabytes of data were transferred. An Exabyte is one quintillion bytes, or 1,000,000,000 gigabytes, or 1,000,000 terabytes. With all of that data zooming around, it is worrisome to learn that in too many cases, the number one threat to data security is a company’s own internal employees, representing 60-70% of security threats, of which only half were accidental.

This is one of the biggest problems a company faces, but one that is not noticed as easily as the larger concepts such as moving to the cloud. When our presenter asked how many in his audience of 60 routinely encrypted their hard drives, less than half raised their hand.

This points to a contentious issue in cloud security. Simply integrating a new technology stream is not a full guarantee of safety and security when the people who use it do not understand or adhere to security proto

cols themselves. This is why HP is working hard at their cloud systems conference and beyond, to discuss the human factor: they want to help customers get their minds around the concepts of safety and prudence in action.

With demands on IT budgets growing disproportionately to the actual available money, HP emphasizes the importance of educating executives and companies as to best practices – IT hygiene – and this further s HP’s mission of becoming a key outsourcing relationship partner.

To best describe the benefits of cloud solutions, HP says, it must be described to executives like insurance – fire insurance, for example, since insurance is one of those intangibles that cannot be seen, but which has achieved legitimacy in the budget cycle. Furthermore, they stress the importance of benchmarking and follow-up – showing executives what has worked, and what it has saved them in time, money and security.

They have come up with a consulting/customer care relationship that stresses building a community of purpose. I repeat that word: purpose: Conscious actions by people to achieve a goal. This helps build physical usage patterns that are a far cry from the rote actions that become the open door for security threats.

Assess, transform, manage, optimize. This is how the HP people move in and walk alongside their customers, ensuring that all technological change (such as data migration to the cloud), is matched with procedures and habits that ensure safety starts at its most vulnerable point – the end users themselves.

By Steve Prentice

Post Sponsored by HP 

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Are You Sure You Are Ready For The Cloud: Security

Are You Sure You Are Ready For The Cloud: Security

Cloud Security For the last several months, we have been discussing ways to make sure you are ready for the next step in your IT evolution: Cloud. When review the different steps of making sure you are ready, one that I have intentionally avoided was Security. I spoke to you about “Security of Business”, but…

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs and the Cloud The mergers and acquisitions market is a complex and challenging industry and the last two years has seen a rise in the number of transactions. Working with companies in this space over the last 10 years, we at RKON have seen and hopefully helped change the mindset of private equity…

4 Things To Know Before Virtualizing Your Desktops

4 Things To Know Before Virtualizing Your Desktops

Forrester Research: The Keys to a Successful Deployment Desktop virtualization projects are transformational. They can dramatically minimize IT costs while better empowering workers with more ubiquitous access to the applications and data they need to be productive. In fact, according to recent research by Forrester, worker productivity when working remotely across multiple devices, increased 51%…

Four FinTech Trends To Look Out For

Four FinTech Trends To Look Out For

FinTech Trends The fintech industry witnessed an enormous growth in 2015. Around $7.6 billion were invested in fintech companies last year, a substantial increase from the $4.7 billion in 2014. There is no doubt that this momentum will continue this year. The growth of capital being invested in fintech companies illustrates how technology and the…

How Your Business Can Overcome Its Fear of BYOD

How Your Business Can Overcome Its Fear of BYOD

Overcoming BYOD Fear While the popularity of the remote workforce has been on the rise, more and more people are returning to the office to work out of fear that their business data isn’t secure, according to a Neustar report. A whopping 83 percent of respondents are worried about the security of their files, and 27…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many agencies have made strides toward hardening their cyber security, outdated IT infrastructure and architecture is…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor