Report Traces Cloud Computing Security Errors To Errant Humans

Report Traces Cloud Computing Security Errors in India, other Countries to Errant Humans

While India has attracted a number of big giants in the Information Technology and cloud computing niches, it still ranks as one of the top guns that suffer security compromises. A report that came out early June, with a focus on the 2012 cloud environment around the globe, and particularly the subcontinent, showed a trend of rising cost-per-safety-compromise that is likely to hike where humans botch up their digital work. The report finds crossroads between the three-quarters of data the Indian subcontinent lost over the past year to human laxity, in organizational matters, and system hitches. At the same time, the global equivalent of these compromises that had similar causes to that of India, the human and the technical, were two-thirds.

The Expense

The approach of this report is that of costs that emanate from the act of security infiltration for each time it happens. The median for the planet’s compromises in 2012 was worth about 7360 Indian Rupees, which comes to mean a lot of data bucks going down the drain, and machines crashing. The Indian equivalent of this breach reaches to 2271 Rupees per hit, infection or data loss. If one were to multiply these instances, it would mean a whole industry collapsing from too much occurrences of an ugly character.

Not quite surprising, the industries that rely mostly on cloud computing are the major victims of this breach on their servers. These include companies in the pharmacy industry, one of the mainstays of the Indian merchant economy, medical sector and finance. Interestingly, the sectors, in spite of being the most close to call, for they enjoy close surveillance by the administration, underwent security barrages of above 70%, in cost, than the rest.

The Solution

Despite the proliferation of insecurity in the cloud computing dispensation in India, there is still a light at the end of the tunnel in the name of departmental approach. The report delineated contexts where companies with CISO or officials who look into the security wing of the compute, storage or software offering in a company, had less malfunctions than the rest. This is because the technical officers routed out the clout in the eye of companies from within: the employees. Indeed, firms in India, or elsewhere, who only approach security from an offshore server perspective, are increasingly suffering breaches than those that guide their staff to secure their in-house systems.

The other factor is to undertake extensive response projections, to ensure that any new security incident will be easy to counter. Training the staff on the same is part of the bargain, for an organization does not rely on a security officer alone. The head of a high-profile institute in India has revealed, on the peripheries of this latest report, that an eight-year reconnaissance on data safety has revealed to them that staff habit is one of the most important disadvantages. In fact, between the unveiling of the last and this report, the breaches that link directly to staff have upped by 22%, perhaps due to the consciousness of the social web that has caught up with people, everywhere.

The recommendation is to keep data in the cloud secure by adopting the departmental approaches, above. Companies that have evolved dynamic safety frameworks have shown staying power. They have kept their employees’ private data, that of the organization and that of consumers, secure, to degrees that are 20% on the lower side of the global mean. This is because they know that security is not all about the sites or servers, but the devices, which can include cell phones, computers or any other gadget.

The report reveals much about cloud computing security that is not just Indian but global. From small-scale theft of data though flash discs to high-profile cyber phishing, companies, on the modern platform, have to deal with complex safety issues. However, as the Indian case has revealed, the best way is to start from below, by dispelling the petty data theft issues, before inching up the staff ladder, appropriating response mechanisms, and finally, incorporating CISOs to oversee organizational cloud security framework.

By John Omwamba

John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

Latest posts by John (see all)

FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About Latest Posts JohnJohn posses over five

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014 The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses,

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving