Report Traces Cloud Computing Security Errors To Errant Humans

Report Traces Cloud Computing Security Errors in India, other Countries to Errant Humans

While India has attracted a number of big giants in the Information Technology and cloud computing niches, it still ranks as one of the top guns that suffer security compromises. A report that came out early June, with a focus on the 2012 cloud environment around the globe, and particularly the subcontinent, showed a trend of rising cost-per-safety-compromise that is likely to hike where humans botch up their digital work. The report finds crossroads between the three-quarters of data the Indian subcontinent lost over the past year to human laxity, in organizational matters, and system hitches. At the same time, the global equivalent of these compromises that had similar causes to that of India, the human and the technical, were two-thirds.

The Expense

The approach of this report is that of costs that emanate from the act of security infiltration for each time it happens. The median for the planet’s compromises in 2012 was worth about 7360 Indian Rupees, which comes to mean a lot of data bucks going down the drain, and machines crashing. The Indian equivalent of this breach reaches to 2271 Rupees per hit, infection or data loss. If one were to multiply these instances, it would mean a whole industry collapsing from too much occurrences of an ugly character.

Not quite surprising, the industries that rely mostly on cloud computing are the major victims of this breach on their servers. These include companies in the pharmacy industry, one of the mainstays of the Indian merchant economy, medical sector and finance. Interestingly, the sectors, in spite of being the most close to call, for they enjoy close surveillance by the administration, underwent security barrages of above 70%, in cost, than the rest.

The Solution

Despite the proliferation of insecurity in the cloud computing dispensation in India, there is still a light at the end of the tunnel in the name of departmental approach. The report delineated contexts where companies with CISO or officials who look into the security wing of the compute, storage or software offering in a company, had less malfunctions than the rest. This is because the technical officers routed out the clout in the eye of companies from within: the employees. Indeed, firms in India, or elsewhere, who only approach security from an offshore server perspective, are increasingly suffering breaches than those that guide their staff to secure their in-house systems.

The other factor is to undertake extensive response projections, to ensure that any new security incident will be easy to counter. Training the staff on the same is part of the bargain, for an organization does not rely on a security officer alone. The head of a high-profile institute in India has revealed, on the peripheries of this latest report, that an eight-year reconnaissance on data safety has revealed to them that staff habit is one of the most important disadvantages. In fact, between the unveiling of the last and this report, the breaches that link directly to staff have upped by 22%, perhaps due to the consciousness of the social web that has caught up with people, everywhere.

The recommendation is to keep data in the cloud secure by adopting the departmental approaches, above. Companies that have evolved dynamic safety frameworks have shown staying power. They have kept their employees’ private data, that of the organization and that of consumers, secure, to degrees that are 20% on the lower side of the global mean. This is because they know that security is not all about the sites or servers, but the devices, which can include cell phones, computers or any other gadget.

The report reveals much about cloud computing security that is not just Indian but global. From small-scale theft of data though flash discs to high-profile cyber phishing, companies, on the modern platform, have to deal with complex safety issues. However, as the Indian case has revealed, the best way is to start from below, by dispelling the petty data theft issues, before inching up the staff ladder, appropriating response mechanisms, and finally, incorporating CISOs to oversee organizational cloud security framework.

By John Omwamba

John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

Latest posts by John (see all)

Sorry, comments are closed for this post.

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues Nowadays, many companies are changing their overall information technology strategies to embrace cloud computing in order to open up business opportunities.  There are numerous definitions of cloud computing. Simply speaking, the term “cloud computing” comes from network diagrams in which cloud shapes are  used to describe certain types of networks. All…

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and store data. The…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Interesting Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. So much, in fact, that you’re probably getting sick of hearing about it. Here are some interesting facts you might not know about big data via The Visual Capitalist: Big Data got its start in…

Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation. Below is an infographic provided courtesy of the group at Netskope which goes into further detail.…

CONNECT TO THE CLOUD

 

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021