HP ‘Master The Cloud’ Event (Toronto) – Part 2

HP ‘Master The Cloud’ Event (Toronto) – Part 2

HP ‘Master The Cloud’ Event (Toronto) – Part 2

Here’s an interesting parallel, one somewhat removed from the busy world of cloud computing. In the world of “people,” social psychologists who specialize in generational issues are starting to refer to the most recent generation of kids coming-of-age as the Purell generation, since they are likely to be aware of every hand sanitizer bottle or station in their homes, schools, and favourite stores.

This thought came to me as I observed a breakout session on cloud security at the HP Master The Cloud conference, in which the presenter discussed the principle of practicing good IT hygiene. Good IT hygiene. That’s a great term to help get the concept of cloud security across to executives and others who are not comfortable with standard IT terms.

While businesses and organizations wrestle with their fears of moving to the cloud, the security analysts at HP reminded the audience that last year 1773 Exabytes of data were transferred. An Exabyte is one quintillion bytes, or 1,000,000,000 gigabytes, or 1,000,000 terabytes. With all of that data zooming around, it is worrisome to learn that in too many cases, the number one threat to data security is a company’s own internal employees, representing 60-70% of security threats, of which only half were accidental.

This is one of the biggest problems a company faces, but one that is not noticed as easily as the larger concepts such as moving to the cloud. When our presenter asked how many in his audience of 60 routinely encrypted their hard drives, less than half raised their hand.

This points to a contentious issue in cloud security. Simply integrating a new technology stream is not a full guarantee of safety and security when the people who use it do not understand or adhere to security proto

cols themselves. This is why HP is working hard at their cloud systems conference and beyond, to discuss the human factor: they want to help customers get their minds around the concepts of safety and prudence in action.

With demands on IT budgets growing disproportionately to the actual available money, HP emphasizes the importance of educating executives and companies as to best practices – IT hygiene – and this further s HP’s mission of becoming a key outsourcing relationship partner.

To best describe the benefits of cloud solutions, HP says, it must be described to executives like insurance – fire insurance, for example, since insurance is one of those intangibles that cannot be seen, but which has achieved legitimacy in the budget cycle. Furthermore, they stress the importance of benchmarking and follow-up – showing executives what has worked, and what it has saved them in time, money and security.

They have come up with a consulting/customer care relationship that stresses building a community of purpose. I repeat that word: purpose: Conscious actions by people to achieve a goal. This helps build physical usage patterns that are a far cry from the rote actions that become the open door for security threats.

Assess, transform, manage, optimize. This is how the HP people move in and walk alongside their customers, ensuring that all technological change (such as data migration to the cloud), is matched with procedures and habits that ensure safety starts at its most vulnerable point – the end users themselves.

By Steve Prentice

Post Sponsored by HP 

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…