Report Traces Cloud Computing Security Errors To Errant Humans

Report Traces Cloud Computing Security Errors in India, other Countries to Errant Humans

While India has attracted a number of big giants in the Information Technology and cloud computing niches, it still ranks as one of the top guns that suffer security compromises. A report that came out early June, with a focus on the 2012 cloud environment around the globe, and particularly the subcontinent, showed a trend of rising cost-per-safety-compromise that is likely to hike where humans botch up their digital work. The report finds crossroads between the three-quarters of data the Indian subcontinent lost over the past year to human laxity, in organizational matters, and system hitches. At the same time, the global equivalent of these compromises that had similar causes to that of India, the human and the technical, were two-thirds.

The Expense

The approach of this report is that of costs that emanate from the act of security infiltration for each time it happens. The median for the planet’s compromises in 2012 was worth about 7360 Indian Rupees, which comes to mean a lot of data bucks going down the drain, and machines crashing. The Indian equivalent of this breach reaches to 2271 Rupees per hit, infection or data loss. If one were to multiply these instances, it would mean a whole industry collapsing from too much occurrences of an ugly character.

Not quite surprising, the industries that rely mostly on cloud computing are the major victims of this breach on their servers. These include companies in the pharmacy industry, one of the mainstays of the Indian merchant economy, medical sector and finance. Interestingly, the sectors, in spite of being the most close to call, for they enjoy close surveillance by the administration, underwent security barrages of above 70%, in cost, than the rest.

The Solution

Despite the proliferation of insecurity in the cloud computing dispensation in India, there is still a light at the end of the tunnel in the name of departmental approach. The report delineated contexts where companies with CISO or officials who look into the security wing of the compute, storage or software offering in a company, had less malfunctions than the rest. This is because the technical officers routed out the clout in the eye of companies from within: the employees. Indeed, firms in India, or elsewhere, who only approach security from an offshore server perspective, are increasingly suffering breaches than those that guide their staff to secure their in-house systems.

The other factor is to undertake extensive response projections, to ensure that any new security incident will be easy to counter. Training the staff on the same is part of the bargain, for an organization does not rely on a security officer alone. The head of a high-profile institute in India has revealed, on the peripheries of this latest report, that an eight-year reconnaissance on data safety has revealed to them that staff habit is one of the most important disadvantages. In fact, between the unveiling of the last and this report, the breaches that link directly to staff have upped by 22%, perhaps due to the consciousness of the social web that has caught up with people, everywhere.

The recommendation is to keep data in the cloud secure by adopting the departmental approaches, above. Companies that have evolved dynamic safety frameworks have shown staying power. They have kept their employees’ private data, that of the organization and that of consumers, secure, to degrees that are 20% on the lower side of the global mean. This is because they know that security is not all about the sites or servers, but the devices, which can include cell phones, computers or any other gadget.

The report reveals much about cloud computing security that is not just Indian but global. From small-scale theft of data though flash discs to high-profile cyber phishing, companies, on the modern platform, have to deal with complex safety issues. However, as the Indian case has revealed, the best way is to start from below, by dispelling the petty data theft issues, before inching up the staff ladder, appropriating response mechanisms, and finally, incorporating CISOs to oversee organizational cloud security framework.

By John Omwamba

John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

Latest posts by John (see all)


cloud-sponsorship

Add Comment Here