The Lighter Side Of The Cloud – Google Glass
The Lighter Side Of The Cloud – Cloud Therapy
The Lighter Side Of The Cloud – Application Forecaster
The Lighter Side Of The Cloud – Server Management
The Lighter Side Of The Cloud: Intelligence

Keeping Your Business Data Secure In An Insecure World

Keeping Your Business Data Secure In An Insecure World

If you’re a small or medium-sized business (SMB), you might be hoping keeping your head down and staying off the Cloud will keep your data safe from interlopers — hackers and government agencies alike. Yet Verizon Communications’ 2013 Data Breach Investigations Report found 72 percent of data breaches occurred in companies with fewer than 100 employees. As long as your business is above board, malware and phishers might be a bigger concern for you than the National Security Agency. Still, the privacy of your data is related to two C words: choice and control.

Choice

Depending on the needs of your business, public or private Cloud, on-premises, or a hybrid model might work best for you. Setting up a server room might be cost-prohibitive for a small business, while a healthcare company might have concerns about keeping their data security HIPAA-compliant. (Trends suggest many companies see the Cloud in their future. A 2012 survey from Vanson Bourne found 38 percent of businesses have already adapted Cloud computing, while another 29 percent have plans to do so.)

When choosing between Cloud, on-premises, and hybrid options, it’s important to keep the data security pyramid in mind. At the bottom, or least secure, would be running everything from your non-password-protected mobile device, while a tier-one cloud provider or on-premises severs could be at the top, or most secure. But simply because a public Cloud might be a few layers up from the base, it doesn’t mean you and the vendor can’t work together to encrypt and protect your data.

Control

Regardless of where your business decides to keep its data, it’s essential to opt for technology that lets you keep a measure of control. If you’re putting information on the Cloud, do you know where it’s physically stored? Can you pull it off whenever you want? Will you be holding the encryption keys to your data, or will they live in the provider’s Cloud? You’ll want to address these issues with your vendor. The Cloud is everywhere. You’re already in the Cloud.

Even if you’re not on the Cloud, strictly speaking, it doesn’t mean your data isn’t. Your own employees may be storing sensitive files in Dropbox or emailing them to their Google e-mail address so they can work from home. Perhaps their company e-mail is synced to their personal mobile devices. A recent poll from McAfee showed 45 percent of SMBs don’t secure data on employees’ personal devices.

It’s easy to feel insecure when some of the biggest companies in the world find themselves vulnerable to snooping. After a recent breach by the NSA, Google’s working to encrypt the traffic between its data centers. But the revelation serves as an important reminder to review or update your own security policies — and remind your employees why they’re so important. A survey from data security firm SafeNet, Inc. found that 59 percent of respondents would be unsurprised if their boss was violating company policy by using a file-sharing service such as Dropbox. Instead of shunning these convenient tools, Chief Information Officers (CIOs) or Chief Information Security Officers (CISOs) need to take a more realistic approach to protecting data by making sure these Cloud-based apps are used securely.

Ok, now what? Unless you’re planning on unplugging the router and going entirely on paper, it’s imperative to protect your data wherever it lives. The Cloud Security Alliance’s best practices is a useful guide. Its recommendations include evaluating which assets you feel comfortable transferring to the Cloud, identifying threats and how they would impact your business, and developing risk treatment plans.

But perhaps the best place to start is a refresher course for employees. Forrester research shows 36 percent of security breaches are caused by employees’ inadvertent misuse of data. Last year, businesses lost $1.5 billion in phishing attacks, according to a report by EMC Corp. Employees at all levels — online-rsa-fraud-report-012013 — are tricked into opening e-mails that appear to be from a colleague. From there, the recipient is asked to reset a password, click a harmful link, or even wire $100,000 into an account. Falling for such a scam can happen to just about anyone. (Just ask Coca-Cola exec Paul Etchells.)

Finally, in line with the desire for control and choice, make sure to grill your cloud software provider with questions like these.

You should have the power to control where your information ends up and choose who has access to it. The threat of spies or hackers shouldn’t send you screaming for the WiFi-less hills, but hopefully it will inspire you to tighten your security belt, no matter where it lies.

stijn-hendrikse

By Stijn Hendrikse

Sijin is the Chief Marketing Officer at Acumatica. He has over 20 years of experience in the software business.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Recent

Cloud Vendor Benchmark 2015: Price-Performance Comparison

Cloud Vendor Benchmark 2015: Price-Performance Comparison

Cloud Vendor Benchmark 2015: 15 Top IaaS Providers Guest post by Cloud Spectator Cloud Spectator has released their Cloud Vendor Benchmark 2015 Part 2: Price-Performance Comparison Among 15 Top IaaS Providers today, cited as the industry’s most comprehensive study. Exposing the influence that performance can have on the overall value of the IaaS environment, this report…

Finland and The Future of The Internet

Finland and The Future of The Internet

Finlands Internet Future In so many ways, the nations of Northern Europe seem to be a few steps ahead of the rest of the world – countries like Norway, Sweden, Denmark, and Finland are frequently singled out for praise in areas as diverse as education, technology, and sheer happiness (despite the grey skies and bitter…

Technologies That Work Nicely With The Cloud

Technologies That Work Nicely With The Cloud

New Technologies And The Cloud Asides from all the security concerns that has been in the news over the past while, there are still some very exciting and ambitious opportunities available for those who stick it out. Lets take a look at some of the more exciting emerging technologies that can be used in conjunction…

Popular Archives

The Growth Of Rampant Digital Diseases

The Growth Of Rampant Digital Diseases

Rampant Digital Diseases Keeping ‘Rombertik’ at Bay – The New Malware that Destroys Hard-Drives A new form of malware is still on the loose, and this one takes malicious to a whole new level. Nicknamed ‘Rombertik’ by Cisco Systems, the malware attempts to infiltrate the victim’s browser to procure confidential information; fairly standard operating procedure…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Sponsors

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising