Category Archives: Cloud Computing

10 Steps To Success With The Cloud

10 Steps To Success With The Cloud

10 Steps To Success With The Cloud

The cloud, the trend that appears to be steaming on ahead as the likes of Salesforce, Amazon’s Web Services and Workday continue to gain market value. Utilising cloud services for business has allowed for companies to scale, drive IT costs down and become a more agile, streamlined business.

There are a few steps that should be taken by any company before they decide to make the switch across the cloud, and these are even steps that companies utilising the cloud should make sure they’re aware of to keep cloud usage both in check and running smoothly.

The pace of cloud computing shows no sign of letting up with likes of Salesforce, Amazon’s Web Services and Workday expanding rapidly and gaining market value.

cloud-10

Utilising cloud services allows companies to scale, drive IT costs down and become more agile. However to keep cloud usage in check and systems running smoothly there are a number of factors that should be considered:

1) Assess what business infrastructure can be outsourced.

Before considering the cloud, check you’re sure what business infrastructure, processes and systems you’re willing to outsource. Whether its email exchange or data storage, having an on premise solution gives you direct control so in the event of downtime you are able to act.

2) Calculate the savings.

When it comes to justifying the cost of implementing cloud services it’s crucial to be sure you’re going to make a saving. Replacing and maintaining hardware can be a costly expenditure and the cloud can reduce a large amount of hardware costs, however Cloud based services need licences and the cost of multiple licences can quickly mount up

3) Be aware of compliance issues.

When data is moved between an internal network and cloud storage it is important to know how the data is going to be stored and secured. Laws such as the UK’s Data Protection Act protects personal information from misuse while the US has Sarbanes-Oxley which all publicly traded companies must comply with , covering all financial systems and forcing SSL encryption policies upon finance departments.

4) Understand the differences between the private, public and hybrid cloud.

There are a few key distinctions on the differences between differing cloud types. A public cloud is just that, public, SaaS providers utilise a public cloud to offer their services. A private cloud is hosted internally to employees and gives a high level of security. A hybrid cloud allows for the most effective deployment, such as a business using public cloud computing resources to scale quicker.

5) Get an SLA with your cloud provider.

Downtime affects everyone but having a service level agreement with a cloud hosting company can make sure that if downtime does happen, your business is up and running as quickly as possible. Applications that are migrated onto the cloud are expected to perform at the same level as dedicated hardware, if not perform better, so an SLA is key to keeping performance maximised.

6) Create Cloud policies.

Policies for how the cloud should be used within a company are important to make resources are used correctly, whether it is data storage, file or shared web services.

7) Be aware of all the security implications.

The cloud has security implications that need to be addressed. Endpoint security can be put in place that monitors information as it travels outside of an organisation to reduce the risk of data leakage. Heavy fines can be levied against data leaks so it’s important to take the appropriate measures to reduce the risk.

8) Monitor usage of the cloud and the cloud itself.

Depending what your main use of the cloud is, whether it’s public or private, it’s important to monitor both the status of the implementation as well as monitoring the usage that it is experiencing. Monitoring can give you greater insight into what is happening on the network and allows you to foresee any future issues or trends, such as downtime or server latency.

9) Manage users and manage licenses.

The cloud brings with it a whole host of issues surrounding users, from multiple logins for several different SaaS platforms to individual licensing management. Making sure that licenses are used effectively across teams is an important step to making the most effective use of the cloud. Management tools that allow for single sign on are a worthy investment but come with additional risks that should be taken into consideration.

10) Keep up-to-date with changes and improvements from providers.

SaaS providers are now in a race to the top, functionality that used to be done through a physical update can now be launched across the network giving the user the latest and greatest functionality immediately. Keeping up with these changes can make sure you’re using your cloud based applications to the best of their ability.

While there is no silver bullet to make the most from the cloud, these are some of the ways you can make it easier during implementation, deployment and usage for your business.

By Brian King,

This article was written by Brian King, Digital Marketing Manager at Opsview, a leading network performance monitoring company.

(Image Source: Shutterstock)

The Lighter Side Of The Cloud – Birds & The Bees

The Lighter Side Of The Cloud – Birds & The Bees



cloud_172

By David Fletcher

All David Fletcher comic images on this site are owned by CloudTweaks.com. If you would like to reuse them on your social media network, please feel free to do so as long as there is a clearly defined link to the original comic source. If you would like to use them in a Newsletter, Print, Powerpoint or Website. Please contact us regarding the licensing details and policies.

What The Gartner Big Data 2013 Report Means For The Industry

What The Gartner Big Data 2013 Report Means For The Industry

What The Gartner Big Data 2013 Report Means For The Industry

Gartner’s 2013 Big Data survey was recently released and has highlighted some of the long held beliefs in Big Data with survey evidence to prove it.

The survey itself was primarily focused on companies currently working with Gartner. Despite this, due to the numbers and varieties, this is still a broad and impressive number who can realistically give accurate results.

One of the most striking results to come out of the survey was that 64% of companies were planning or have already implemented Big Data systems. This is a significant number as it show that there is a genuine drive within companies to adopt the system. That more than half of companies are looking at the ways they are using data and looking at new data initiatives is only going to be a positive for industry growth.

Big-Data-Movement

(Image Source: Shutterstock)

This is especially pertinent when discussing the future of the industry, as this 64% represents overall plans or implementations, but only 8% of those who are planning on implementing have actually made moves towards it. The 92% gap represents a large list of potential clients for consultants, cloud database products and technology providers.

The 92% potential growth shows not only the willingness of companies to implement, but the future business that will create longevity for Big Data in the next decade. Far from a flash in the pan, with this kind of demand and potential revenue, investments become safer and therefore the industry has a better foundation to grow.

Banking and media are the industries that have made the biggest strides in this area. That these are also two of the traditionally rich industries is unsurprising, but especially with the banking sector, shows that there is a business case for utilising this technology and a definite profit to be made from it.

So why are these companies looking to implement? 

There have been countless success stories of companies using Big Data to make billions, the Facebooks, Googles and YouTubes of this world have set a strong precedent for how correct data usage can have a significant impact on revenues. Therefore, it is unsurprising that many companies are looking at the ways that these behemoths have used their data.

In each of these cases it has been about customer experience, putting the correct information in front of them at the correct time to create money making situations. This aligns with the survey findings, where the most important reason for wanting to implement Big Data systems is the improvement of customer experience.

According to the survey though, organisations struggle most with knowing how to get value from Big Data. This means that although the merits of a successful implementation are evident from the success of several companies, the individual company rewards from this are difficult to find.

A lack of knowledge in value creation is fed by one of main stumbling blocks for new data implementations; talent acquisition. This is a key concern for many companies as the conversion of meaningful data analysis to actionable business strategies is difficult and requires the kind of skills that are difficult to find in such a new and quickly growing industry.

Gartner have found through discussions with companies who are looking at implementation that despite the drive towards new data initiatives, within the experimentation stage trends are found, but the skills are not available to use these for significant business gains. Therefore leaders become reluctant to move forward when the tentative steps promised much but delivered little.

What are people doing with data? 

Despite the hype around new types of data such as text analysis, image analysis and sensor data, the vast bulk collected is still transactional in nature. This is testament to the customer experience focus of many companies today who can associate certain individual actions to viable business processes.

Gartner’s studies have revealed that there is an increase in the use of machine gathered information such as sensor fed data collection. With the increased use of sensors within electronic devices this is likely to only increase in future.

Overall the Gartner report gives backing to many of the widely held beliefs within the industry. As the famous saying goes ‘if it cannot be measured it cannot exist‘ and this report puts numbers behind assumptions and gives genuine weight to what industry insiders have been saying for a relatively long time.

The report overall will give companies looking to implement a real drive to put some real investment behind Big Data service initiatives whilst also giving practitioners the confidence to expand. We are told that one of the main reasons that startups fail is due to aggressive expansion too quickly, creating unsustainable business models with no genuine numbers behind future business. This report will hopefully give these companies the confidence to go ahead and expand to fill what will be a shortfall in the market within the next decade.

By Gil Allouche

Gil Allouche is the Vice President of Marketing at Qubole. Gil began his marketing career as a product strategist at SAP while earning his MBA at Babson College and is a former software engineer.

Better Data Risk Mitigation For SaaS Providers

Better Data Risk Mitigation For SaaS Providers

Better Data Risk Mitigation for SaaS Providers

SaaS-Security

We live in a world that is rife with internal-controls breakdowns that result in security and data breaches, which can cause tremendous business and reputational damage for organizations.

The rise of cloud computing systems has now created an even greater need for organizations to develop the right controls to protect data that reside in the ‘cloud.’ Virtually every organization leverages Software-as-a-Service (SaaS) solutions – where data can be easily accessed through a web browser.

As most technology providers are migrating away from larger enterprise data systems to the cloud, it opens the doors to vulnerabilities. With SaaS providers hosting vital client data, they need to provide the right level of assurance that their clients’ sensitive data resides in a highly trusted environment.

Created by the American Institute of Certified Public Accountants (AICPA), Service Organization Control 2 (SOC 2) reporting allows any SaaS provider to mitigate risk when it comes to managing sensitive customer data in a virtualized environment.

Going through a SOC 2 security audit and receiving a favorable report allows SaaS providers to build-in a level of controls and trust in relationships with clients. However, the challenge with SOC 2 reporting is that many SaaS providers are unaware of this reporting and that not having an audit completed can cause significant business damage.

In addition, it is often the SaaS providers’ clients who inquire about SOC 2 reporting, and an “I don’t know” response does not provide clients with the critical assurance that they seek.

Fortunately, there are new tools that help SaaS providers determine their readiness to undergo a SOC 2 security audit and gain a ‘clean opinion.’

As more organizations are seeking support from SaaS providers, we will continue to see the true value of cloud computing emerge for any business sector. Providing the right level of assurance is critical for SaaS providers to further grow their businesses, and the little secret of undergoing a SOC 2 audit is now out of the bag.

Now, is the time to make sure that all of your clients’ data is residing in a truly trusted environment, and there are solutions for meeting this goal.

By Paul L. Shifrin, CPA, is a Director of Audit Services at SC&H Group

Paul directs SC&H’s SOC/SSAE 16 auditing practice, providing companies with audit services for their outsourcing of key components of their clients’ internal controls.

(Image Source: Shutterstock)

How Cloud Services Have Changed The Mindset Of Outsourcing

How Cloud Services Have Changed The Mindset Of Outsourcing

How Cloud Services Have Changed the Mindset of Outsourcing

The business of information technology outsourcing has been dominated by sizable companies such as IBM, CSC, ASC and others that provide a comprehensive line card of IT services.  These mammoth outsourcers were viewed as a one-stop-shop delivering IT services ranging from level-1 help desk to level-3 network engineers and even C-level executives.  This one-throat-to-choke mentality was popular with companies looking to outsource as it was thought to replace the finger pointing between multiple vendors with the hopes of a single, unified IT solution.  In some cases operational excellence was achieved and IT services improved while cost was contained.  While there were success stories, many outsourcing arrangements were a failure based on the customer’s experience.  Costs often ended up increasing during the duration of the contract while SLA’s and response times were often higher.

Single Source Dominated

So why did these single source providers dominant when there appeared to be so many disgruntled customers?  These providers were uniquely capable of building IT teams with competence ranging from help desk to CIO level skills on technologies from PCs to Mainframes.  An ability that required massive recruiting and training efforts not afforded to the smaller companies.

Secondly, these outsourcing contracts were not only diverse in technical skill requirements but also geographically challenging.   Many of the companies that chose to outsource not only had numerous locations geographically dispersed across the United States but internationally.

“While there were success stories, many outsourcing arrangements were a failure based on the customer’s experience.”

Only the large outsourcer with a global breadth of resources was able to support these complex opportunities.

Finally, most outsourcing contracts were a minimum of 5 years in duration and valued in the tens or hundreds of millions of dollars.  In order to win contracts of this size the providers needed to demonstrate financial stability and long-term viability.

As a result, companies seeking to outsource developed all encompassing requests for proposals with the goal of selecting a single provider capable of delivering a full compliment of IT services.  By its very nature, this thought process eliminated the smaller outsourcers focused on fewer technologies and services even though they were often better qualified in their areas of specialization, than their larger counterparts.

The Problem

The larger outsourcers, through no fault of their own, often fell into the category of “jack of all trades, master of none”.  Trying to be the best in everything IT is a paramount challenge very few, if any, can accomplish.  Also, in order to assure profitability, these providers implemented common computing platforms which provided benefit to the customer by introducing stability while allowing the outsourcers to move employees between customers with minimal learning curve.  The downside was these common platforms were often based on older technology thereby stifling the customer’s ability to innovate based on the newer technologies available.

The Shift in Thinking

The Cloud, as defined by NIST, “is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”.   So what does the Cloud have to do with outsourcing? The Software as a Service (SaaS) delivery method of the Cloud Model is the catalyst to the outsourcing mind shift.

SaaS is the capability provided to the consumer to use the provider’s applications running on a cloud infrastructure.  Popular SaaS providers like SalesForce.com provide a targeted IT solution to companies delivered entirely from their managed cloud platform to any end-user with Internet connectivity and a browser.  These solutions are quickly provisioned, require minimal customer intervention and are available for a monthly fee.  As more and more customers leverage these SaaS solutions ranging from hosted Customer Relationship Management Systems, Sales Automation Systems, Accounting Systems, Email, SPAM/AntiVirus, Archiving and the countless other cloud based software solutions, it becomes apparent that the IT group’s thinking is shifting.  SaaS has even enabled a new outsourcing model called “Shadow IT” which is where lines of business directly contract for IT services without involving their internal IT departments.  IT, now often driven by Shadow IT, is open to outsourcing specific IT solutions to best of breed providers.  This is a significant change from the one-throat-to-choke mentality of the past.

These Disrupters are companies that leverage the Cloud to quickly startup a company with nothing more than an idea.  The relative low cost, flexibility and speed to provision IT services provided by the Cloud has allowed these new companies to bring a concept to market so inexpensively that business plans and the funding they are often written for are not necessary.  Market research is no longer theoretical but delivered in real time based on social media feedback.  The barriers to launch a business by these disrupters have been eliminated.  These SaaS providers often leverage the other two Cloud delivery models of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) to build and distribute their offering.

The end result is companies of all sizes leverage the Cloud to provide best of breed solutions and these solutions are consumed by organizations based on best-of-breed service.

Benefitting The Corporations

As enterprises continue to utilize Cloud Services to fulfill their needs, “These Disrupters are companies that leverage the Cloud to quickly startup a company with nothing more than an idea.

Cloud specific positions are appearing within these companies.  At this time, many of the positions are dedicated to managing an organization’s Cloud Provider partners.  Companies will get more granular with their IT outsourcing needs as these positions become more prevalent and they feel more comfortable delegating their IT functions across many Cloud Providers.

Also, these functions will not be limited to SaaS offerings.  IaaS is a general platform being offered by Cloud Providers.  IaaS provides a cost effective medium for companies to acquire compute and storage resources while providing the flexibility and scalability required to meet ever-changing business demands.  Companies want to get out of “the server hardware and storage business” and spend their time focusing on solving business issues.  Skilled IaaS providers, those with a systems integration background, are leveraging their IaaS platform to deliver turnkey, outsourced solution for a monthly fee to their customers.

disaster-recovery

(Image Sources: Shutterstock)

Disaster recovery is a perfect example of such a turnkey solution.  Disaster Recovery as a Service (DRaaS) is a solution which replicates a customers mission critical servers to a Cloud Providers IaaS.  If the customer declares a disaster, the Cloud Providers activates the replicated servers at their location and turns them into the customer’s production site.  The Cloud provider is responsible for monitoring the replication, activating the servers to production and managing all other aspects to successfully make the replicated environment accessible by the customer.    Another example of a turnkey solutions is Desktop as a Service (DaaS) where customers host their Windows desktops at a Cloud Provider or the outsourcers that leverage their IaaS offering host and manage a customer’s entire IT infrastructure.

This shift will allow smaller, more focused companies to win their share of the outsourcing business.  The customer will benefit by working with specialists in each area to fulfill their needs rather than settling for the bigger, often less skilled, single source solution.

By Marc Malizia,

Marc is the Chief Technology Office and a founding partner for RKON Inc.  As the CTO, he has responsibilities for designing and enhancing both RKON’s Professional and Cloud Service offerings.  During his 15 years growing RKON, Marc served as a pre-sales subject matter expert on technologies ranging from application delivery and security to Cloud and managed services.  Marc earned a B.S. in Computer Science from the University of Illinois in 1987 and a M.S. in Telecommunication from DePaul University in 1992.

Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

criminal-cyber-program

We all have our concerns when it comes to Cloud computing security and privacy. From our children being exposed to indecent images and videos, or the negative effects of social media, to identity theft and pornography. It’s a technology we use on a daily basis, but in many ways we lack understanding and a sense of real control.

We hear stories each year about sites that get taken down and the people that create or use them being arrested, but these announcements seem to few and far between. They are not a solution to the overall problem, and how long will it be before the next story or controversial site?

The most recent story concerns the shut down of a black market site called ‘Silk Road’ and the subsequent arrest of its creator Ross Ulbricht. Silk Road was the culmination of all the worst aspects of criminality both on and off the Internet. This site facilitated the anonymous trade of drugs, guns, porn, hit men, forged documents and computer hackers.

Silk Road was able to exist and function through the use of ‘darknet’ and ‘Tor’. Darknet uses peer-to-peer networks in order to remain anonymous, and Tor (aka The Onion Router) uses separate servers in order to disguise users online presence and location.

The paper trail that would normally accumulate during sales of over $1.2 billion to a million customers was hidden by the use of a virtual currency system called ‘bitcoin’. Bitcoin covered the financial tracks that are often left by credit card use online.

When you see the tactics used by Ulbricht, aka ‘Dread Pirate Roberts’, you wonder how he was ever caught.

The FBI found the six servers hidden in various locations around the world. These servers provided the data that exposed transactions, enabled the site to be shutdown, as well as the arrest of Ulbricht. But what does this arrest and website seizure really mean in the long run? Will this deter future criminals?

In the same way that the Internet and cloud technology is enabling smaller businesses to compete on the global market, so too has it helped criminals widen theirs.

This article, as well as many other you may find on the Internet lists the ways in which Ulbricht was able to run Silk Road, but also how he was found. If one criminal makes a mistake and is made an example of, others around will learn from them and adapt. It may become harder for the authorities across the world to catch cyber criminals.

There will always be concerns in regards to the Internet. It is a platform that can be exploited by criminals, in the same way that criminals uses trucks for people trafficking and airplanes for drug smuggling. There will always be some level of threat if criminals exist.

The question that needs to be answered is whether it should be the authorities should be allowed to use unlawful measures, such as hacking, in order to apprehend those who are doing so for financial gain?

By Gregory Clark

Gregory Clark is freelance writer and tester of compliance management software from Metacompliance.

CloudTweaks Comics
What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

The CloudTweaks Archive - Posted by
Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…