Report Traces Cloud Computing Security Errors To Errant Humans

Report Traces Cloud Computing Security Errors in India, other Countries to Errant Humans

While India has attracted a number of big giants in the Information Technology and cloud computing niches, it still ranks as one of the top guns that suffer security compromises. A report that came out early June, with a focus on the 2012 cloud environment around the globe, and particularly the subcontinent, showed a trend of rising cost-per-safety-compromise that is likely to hike where humans botch up their digital work. The report finds crossroads between the three-quarters of data the Indian subcontinent lost over the past year to human laxity, in organizational matters, and system hitches. At the same time, the global equivalent of these compromises that had similar causes to that of India, the human and the technical, were two-thirds.

The Expense

The approach of this report is that of costs that emanate from the act of security infiltration for each time it happens. The median for the planet’s compromises in 2012 was worth about 7360 Indian Rupees, which comes to mean a lot of data bucks going down the drain, and machines crashing. The Indian equivalent of this breach reaches to 2271 Rupees per hit, infection or data loss. If one were to multiply these instances, it would mean a whole industry collapsing from too much occurrences of an ugly character.

Not quite surprising, the industries that rely mostly on cloud computing are the major victims of this breach on their servers. These include companies in the pharmacy industry, one of the mainstays of the Indian merchant economy, medical sector and finance. Interestingly, the sectors, in spite of being the most close to call, for they enjoy close surveillance by the administration, underwent security barrages of above 70%, in cost, than the rest.

The Solution

Despite the proliferation of insecurity in the cloud computing dispensation in India, there is still a light at the end of the tunnel in the name of departmental approach. The report delineated contexts where companies with CISO or officials who look into the security wing of the compute, storage or software offering in a company, had less malfunctions than the rest. This is because the technical officers routed out the clout in the eye of companies from within: the employees. Indeed, firms in India, or elsewhere, who only approach security from an offshore server perspective, are increasingly suffering breaches than those that guide their staff to secure their in-house systems.

The other factor is to undertake extensive response projections, to ensure that any new security incident will be easy to counter. Training the staff on the same is part of the bargain, for an organization does not rely on a security officer alone. The head of a high-profile institute in India has revealed, on the peripheries of this latest report, that an eight-year reconnaissance on data safety has revealed to them that staff habit is one of the most important disadvantages. In fact, between the unveiling of the last and this report, the breaches that link directly to staff have upped by 22%, perhaps due to the consciousness of the social web that has caught up with people, everywhere.

The recommendation is to keep data in the cloud secure by adopting the departmental approaches, above. Companies that have evolved dynamic safety frameworks have shown staying power. They have kept their employees’ private data, that of the organization and that of consumers, secure, to degrees that are 20% on the lower side of the global mean. This is because they know that security is not all about the sites or servers, but the devices, which can include cell phones, computers or any other gadget.

The report reveals much about cloud computing security that is not just Indian but global. From small-scale theft of data though flash discs to high-profile cyber phishing, companies, on the modern platform, have to deal with complex safety issues. However, as the Indian case has revealed, the best way is to start from below, by dispelling the petty data theft issues, before inching up the staff ladder, appropriating response mechanisms, and finally, incorporating CISOs to oversee organizational cloud security framework.

By John Omwamba

John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

Latest posts by John (see all)

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Big Data

To Have and Have Not: Big Data Initiatives In Developing Countries

To Have and Have Not: Big Data Initiatives In Developing Countries

Big Data Initiatives In Developing Countries The poor of the developing countries are becoming increasingly connected, to the point where they too are part of the Big Data revolution that’s happening across the globe. It didn’t come with laptops, though, as some supposed it would. Whereas it costs a fortune to connect broadband to a

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data in Your Garden Big Data and IoT initiatives are springing up all across the globe, making cities, protesters–and just about everything else–smarter. However, thus far there’s been little attention paid to the interactions between these bizarre technologies and living things other than humans. Biology, that is, human biology is one field where Big

Who Holds the Key to the City: Big Data and City Management

Who Holds the Key to the City: Big Data and City Management

Big Data and City Management Cities like New York, Madrid, and especially Rio de Janeiro are augmented with Big Data-powered initiatives that range from combating crime with predictive analytics (New York & Madrid) to providing real-time data for improved management. Although Big Data is no panacea and is mainly used in conjunction with a greater

Internet of Things

Gartner Research – Homes In 2022 Will Contain Hundreds Of Smart Objects

Gartner Research – Homes In 2022 Will Contain Hundreds Of Smart Objects

How the Internet of Things is Saving Lives Just hearing the phrase ‘internet of things’ is enough to strike fear into the hearts of many elderly people. As the world’s economy shifts increasingly towards online-only, the oldest people among us often feel left behind, confused that the ‘way things used to be done’ – the

Where’s the Capital of the Internet of Things?

Where’s the Capital of the Internet of Things?

Where’s the Capital? We all know the capitals of fashion are London, New York and Paris, while the capital of film is Hollywood (or Bollywood!) – but what’s the new capital of the internet? Specifically, the internet of things? The answer – according to new research by Ozy – might surprise you. It’s not Tokyo, Seoul,

Aggregated News

Popular News Sources

Bitcasa Partners With Hutchison Telecommunications Hong Kong

Bitcasa Partners With Hutchison Telecommunications Hong Kong

Bitcasa Partners With Hutchison Telecommunications Hong Kong 3 Hong Kong, the mobile operation of Hutchison Telecommunications Hong Kong Holdings Limited today announced the launch of 3 Super Cloud, a multi-platform cloud storage service, powered by Bitcasa, the … Read the source article at Yahoo Finance About Latest Posts JohnJohn posses over five years experience in professional

It’s A Hybrid Cloud World: Are You Managing Your Hybrid State?

It’s A Hybrid Cloud World: Are You Managing Your Hybrid State?

Managing Your Hybrid State If your company is using cloud computing services today, it’s highly likely you are already in a hybrid cloud configuration. The key question is whether you are actively managing this reality. Whether your company uses Software-as-a-Service (SaaS) or deploys applications to a cloud platform, there is a high likelihood those services are

Rebooting The Brain Through Headsets

Rebooting The Brain Through Headsets

Rebooting The Brain The California based company – Thync, has created a wearable headset that sounds like something out of the movie Brainstorm which is making some noise. As CNN reports: Thync has already tested its product on more than 2,000 people in as many trials. After using Thync, the subjects answer questions about how they feel and