Keeping Your Data And Applications Secure On The Cloud

Keeping Your Data And Applications Secure On The Cloud

When you have all your data and applications permanently stored within your enterprise, you can get away with big security holes and poor data management practices without a serious external threat. However, once your applications and data move to the cloud, your margin for error becomes much smaller. Confidential enterprise data could be traveling all over the public Internet, enabling your employees to work anywhere, anytime, while at the same time exposing data to malicious eyes.  In this post, I will cover some of the things your organization needs to get right to prevent unauthorized access.

Mind the channel

If you are on a public network with an unprotected Wi-Fi connection (such as in an airport or a coffee shop), avoid accessing confidential corporate data. An attack could range from a low-tech physical eavesdropping of your screen to a more high-tech capturing of your data in the channel. Make sure your channel is authenticated and encrypted with protocols such as IPSec,TLS/SSL, SSH and systems such as VPN. If you are sending critical data in plain text, you are inviting trouble.

Implement well-designed user access control

Properly planned user access control is needed for all your data and applications. Employees must be able to access only data they have a need to access. Also mind the flow of information outside the security perimeter. For instance, you must never allow your sales people to export all the CRM data to an excel sheet that they could easily take with them when they leave the company. Always make sure that data access happens through your security interfaces and very few bulk export options are allowed for regular security privileges.

Compartmentalize/segregate data

In 2009, Twitter had a bad security breach that made all the internal discussions and confidential business data public and threatened the future of the young network. The hacker gained access to a single compromised personal Gmail account of an employee and was able to successfully access spreadsheets and documents on Google docs that contained all the corporate information.

Although Google was not at fault in this case, it shows how easy it was for the hacker to access all the corporate information after gaining access to one account. Audit your data storage systems and make sure they are compartmentalized enough to avoid cascading security failures. Classify the information based on the security level and implement high-level security for the most confidential information. Thus, a breach of a low-security account should not expose the data in a high-security account.

Educate your employees

No amount of secure protocols will help if your employees are not trained in security best practices. Mandate them to have strong passwords that are periodically changed. Educate them to never send the passwords as plain text through SMS, email, etc. (you would be surprised by how many employees in tech companies break this basic rule). All the data must be properly encrypted, and the keys must be recycled carefully.

By Balaji Viswanathan

About Balaji

Balaji Viswanathan is the founder of Agni Innovation Labs that helps startups and small businesses with their marketing and tech strategy. He has a Masters in Computer Science from the University of Maryland and has been blogging for the past 7 years on technology and business related topics.

View All Articles

Sorry, comments are closed for this post.

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

The Four C’s – Cloud, Culture, Clash, Change

The Four C’s – Cloud, Culture, Clash, Change

The Cloud, Culture, Clash, Change “I told the new CTO that this cloud stuff was BS. He came charging in with this ‘cloud first policy’ and look what happened. Previously rock solid systems that had worked for years slowed down and had outages as we tried to run them on the cloud. I doubt that…

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud The growth of cloud based business support systems has been staggering, and while some major software houses have quickly positioned themselves as forerunners in the move to the Cloud, there are several high-flying companies that have so far failed to provide small businesses with the level…

Bimodal IT Is Not The Death of Traditional IT

Bimodal IT Is Not The Death of Traditional IT

Not The Death of Traditional IT If you are a CIO, no doubt you are getting pressure from your line of business managers to provide a more agile IT environment so they can take advantage of faster, easier to use cloud applications. If you’re not providing those services, they are probably using them anyway and…

The Internet of Things And The Knowledge Revolution

The Internet of Things And The Knowledge Revolution

The Knowledge Revolution Think about a few things in your life right now. It really doesn’t matter what they are, as long as you interact with them daily. They could be your phone, your shoes, your watch, your car, your refrigerator, your garage door opener…you get the idea. What do all of these things have…

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data Encrypting data is one of the best ways of protecting your data as it moves to the cloud. The only thing better than encrypting your data, is not storing your data at all. Let’s first look at the case of using file sharing applications such as Dropbox. If you are the…

Weighing in on Recurring Revenues to Tip Your Business’ Scale

Weighing in on Recurring Revenues to Tip Your Business’ Scale

Tip Your Business’ Scale CEOs, investors, analysts, and business advisors have fallen in love with the recurring revenue business model. In fact, when comparing like software companies, Wall Street gives 2x higher valuations for businesses with successful recurring revenue models in place. It’s no wonder that research indicates 50% of US businesses have already adopted…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor