BYOD And The Issues Surrounding Cloud Storage

BYOD And The Issues Surrounding Cloud Storage

BYOD And The Issues Surrounding Cloud Storage

As BYOD increases and employees increasingly use personal laptops, smartphones and mobile devices for work purposes, concerns over data security and data privacy remain the most significant barriers to cloud adoption, according to the latest research from the Cloud Industry Forum (CIF). Corporate IT managers and CIOs are rightfully correct in their trepidation as they open their networks to  and data leakage plus lose control over data once it leaves the corporate confines. While employees benefit from the ability to work from anywhere by using the cloud services that provide BYOD support, they also risk the loss of privacy when they inadvertently open access to personal files. This potential loss of privacy is worrisome. byod-image

CIF’s June 2012 research found that 66 percent of respondents said the most significant concern about the adoption of cloud services within the business was data security; this is up from 62 percent in 2011. The issue of data privacy also saw a leap up from 55 percent in 2011 to 66 percent in 2012.

The problem however is not BYOD, but the cloud storage. Using file storage providers such as Dropbox or Google Drive offers convenience and simplicity that may not be available with corporate applications. These services fall into category of Shadow-IT—the case in which users decide that they need a service, one which the IT department will not, or cannot provide to them in a timely manner. In other words, the hardware or software adopted “lives in the shadows” as opposed to being sanctioned and supported by the CIO and corporate IT departments. In the past Shadow IT included smartphones, portable USB drives and tablet computers on the hardware side and applications such as Gmail, instant messaging services and Skype. Shadow-IT now encompasses cloud storage as well. Where data is stored and how securely within these applications, however, cannot always be verified. What is known is that once out of the enterprise IT environment, it becomes impossible for CIOs to know where company data is, or who has access to it. In fact when one signs up for these cloud storage services, one is also giving the service permission to use one’s data (users are advised to check the terms and conditions fine print).

The challenge for cloud providers will be convincing customers that the risks of the cloud do not outweigh the benefits – and those risks include the exposure of data through security incidents. The March 2013 Distributed Denial of Service (DDoS) cyber-attacks on Spamhaus flooded Spamhaus servers blocking traffic and making the servers unreachable. For users storing files in services that use Spamhaus networks, their files were slow to access or in some cases, inaccessible. Other potential threats to documents stored in clouds include caching of information on mobile devices, and stored passwords. Companies may also risk issues with compliance with HIPAA (Health Insurance Portability and Accountability Act of 1996), HCFA (Health Care Financing Administration), FISMA (Federal Information Security Management Act) and SOX (Sarbanes-Oxley Act of 2002).

When IT departments choose cloud services to enable BYOD support, they are quite right to consider security and compliance as well as issues such as price and convenience. The CIF research also found that security concerns had risen in 2012 most noticeably in the private sector, increasing from 59 percent to 67 percent. Conversely, in the public sector concern had narrowly dropped from 69 percent to 66 percent. Both the private and public sector have experienced data attacks and the European Union (EU) have called on both corporations and governments to be more transparent when they suffer data breaches.

In sum, it behooves both cloud storage providers and corporate IT decision makers to focus on security. The clouds have a responsibility to users to protect the data stored from attack and to protect the privacy of documents stored. Moreover, IT departments must acknowledge the growing use of clouds that are brought in by users and realize that the department is never going to be able to compete with the simplicity and ease of use of clouds Consequently, IT must change its own worldview and figure out how to implement needed protection and guidelines to assure the security of data once it leaves the corporate network for the cloud. Such paradigm shifts will not be an easy process for many organizations. The trick will be to have both sticks and carrots—firm and enforceable data control policies and a never-ending search for the best cloud storage to meet changing demands.

By Simon Bain,

Simon Bain is the company founder, CTO and chief architect of Simplexo Ltd’s software solutions.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

One Response to BYOD And The Issues Surrounding Cloud Storage

  1. We are seeing a lot of this in the UK, For larger companies we are seeing a demand for the creation of there own enterprise dropbox services and with open stack swift becoming more established the ability to build scalable in house storage systems is becoming increasing accessible. Once you have built the object storage there are a number of good products available that let you create your own enterprise dropbox and products like maginatics allow only direct access (no sync) meaning your data never leaves the private cloud.
    For the smaller customers Gladinet offers a great solution to addressing the above even if this is located within a service providers cloud 

    @Paulcolwell

Comic
When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

When Will Women In Tech Become The Norm?

When Will Women In Tech Become The Norm?

Tech Diversity It is well known that the technology industry has been dominated by men, but it is also clear that the industry is working to change that. Diversity in the tech industry, especially where it applies to women in tech, has been a topic of discussion for years. Recently the Washington Technology Industry Association…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Edtech and Virtual Reality – Exciting Learning Environment

Edtech and Virtual Reality – Exciting Learning Environment

Customizing Edutech Customized edtech learning solutions are becoming more commonplace as the education industry recognises their potential and begins transforming the traditional structures so as to incorporate innovative developments. From textbooks to tablets, chalkboards to virtual reality, edtech promises not only dynamic and exciting learning environments but better learning strategies and solutions. Virtual Reality and…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…