Category Archives: Security

Infographic: Report Finds Public Wi-Fi Usage Trumps Security Concerns

Infographic: Report Finds Public Wi-Fi Usage Trumps Security Concerns

Xirrus Report

As cyber threats, like ransomware, get more sophisticated, the number of victims and methods of attacks will only increase,” said Morgan Wright, cyber security expert and senior fellow at The Center for Digital Government. “Businesses not only have a corporate responsibility to educate their users of the risks associated with connecting to public Wi-Fi, but also to give them the necessary tools to avoid attacks.”

The study reveals the growing disparity between the increased use of public Wi-Fi and the lack of precaution taken against security threats when connecting.

Key findings include:

  • 48 percent of Wi-Fi users connect to public Wi-Fi at least three times per week; 31 percent connect to public Wi-Fi every day.
  • 91 percent of Wi-Fi users do not believe public Wi-Fi is secure, yet 89 percent use it anyway.
  • When on public Wi-Fi, 83 percent of Wi-Fi users access their email, whether it’s for work or personal reasons, and 43 percent access work/job specific information.
  • Nearly half (46 percent) of Wi-Fi users say their company has not offered cyber security training in the past year.
  • Nearly 30 percent of respondents are not aware of ransomware as a threat, despite it being identified as one of the most pervasive cyber threats.

rolling-the-dice-infographic-full

(Infographic Source: Xirrus via Marketwired)

The Next Wave of Cloud Computing: Artificial Intelligence?

The Next Wave of Cloud Computing: Artificial Intelligence?

Cloud Computing and Artificial Intelligence

Over the past few years, cloud computing has been evolving at a rapid rate. It is becoming the norm in today’s software solutions. Forrester believes that that cloud computing will be a $191 billion market by 2020. According to the 2016 State of Cloud Survey conducted by RightScale, 96% of its respondents are using the cloud, with more enterprise workloads shifting towards public and private clouds. Adoption in both hybrid cloud and DevOps have gone up as well.

cloud-report

The AI-Cloud Landscape

So where could the cloud computing market be headed next? Could the next wave of cloud computing involve artificial intelligence? It certainly appears that way. In a market that is primarily dominated by four major companies – Google, Microsoft, Amazon, and IBM – AI could possibly disrupt the current dynamic.

In the past few years, there has been a surge of investment in AI capabilities in cloud platforms. The big four (Google, Microsoft, Amazon and IBM) are making huge strides in the AI world. Microsoft is currently offering more than twenty cognitive services such as language comprehension and analyzing images. Last year, Amazon’s cloud division added an AI service which lets people add analytical and predictive capabilities to their applications.

The current AI-cloud landscape can essentially be categorized into two groups: AI cloud services and cloud machine learning platforms.

AI Cloud Services

Example of AI cloud services involve technologies such as Microsoft Cognitive Services, Google Cloud Vision, and IBM Watson. In this type of model, organizations incorporate AI capabilities in applications without having to invest in expensive AI infrastructures.

Cloud Machine Learning Platforms

On the flip slide, there are cloud machine learning platforms. Machine learning is a method of data analysis which automates analytical model building. It enables for computers to find patterns automatically as well as areas of importance. Azure Machine Learning and AWS Machine Learning are examples of cloud machine learning platforms.

IBM and Google Making Waves

640px-IBM_Watson

Recently IBM and Google having been making news in the AI realm and it reflects a shift within the tech industry towards deep learning. Just last month, IBM unveiled Project DataWorks, which is supposedly an industry first. It is a cloud-based data and analytics platform which can integrate different types of data and enable AI-powered decision making. The platform provides an environment for collaboration between business users and data professionals. Using technologies like Pixiedust and Brunel, users can create data visualizations with very minimal coding, allowing everyone in the business to gain insights at first look.

Earlier this month at an event in San Francisco, Google unveiled a family of cloud computing services which would allow any developer or business to use machine learning technologies that fuel some of Google’s most powerful services. This move is an attempt by Google to get a bigger foothold in the cloud computing market.

AI-First Cloud

According to Sundar Pichai, chief executive of Google, computing is evolving from a mobile-first to an AI-first world. So what would a next-generation AI-first cloud like? Simply put, it would be one built around AI capabilities. In the upcoming years, we could possibly see AI being key in improving cloud services such as computing and storage. The next wave of cloud computing platforms could also see integrations between AI and the existing catalog of cloud services, such as Paas or SaaS.

It remains to be seen whether AI can disrupt the current cloud computing market, but it will definitely influence and inspire a new wave of cloud computing platforms.

By Joya Scarlata

Where Are Your Users Learning About The Birds And The Bees Of Cloud?

Where Are Your Users Learning About The Birds And The Bees Of Cloud?

Clouding Around

Where did you learn about the birds and bees – from your adolescent peers? How did that work out for accuracy? Today it’s from peers and the Internet. The same is true for your users and the cloud with the same sometimes disastrous consequences. You’re the CIO, shouldn’t they be learning cloud from you? Stop lamenting like Rodney Dangerfield how IT gets no respect. Step up and reach out.

Cloud use is spreading rapidly but most of your users have a vague or misguided concept of what cloud really is and its promises and pitfalls. Want proof? Often quoted are Gartner’s Top Ten Cloud Myths. But that is just scratching the service. A little digging reveals lots of misconceptions about SaaS, like here and here. Even your peers on the management committee hold foggy notions of how it works but are reluctant to admit it. Instead, they echo some of the buzzwords, quote an article they read in the WSJ, etc. Let’s face it. Your firm is already pregnant with cloud. Why not take a page from what your peers do and get ahead of the curve.

Your head of HR works hard at building and executing an education program for the company’s staff. It’s designed to encompass the many different facets of management and leadership to facilitate employees’ progress. It also points out all the policies and laws that need compliance. Attendance and regular testing is mandatory and for good reason. To grow, your firm needs knowledgeable leadership and a strong culture. To stay out of trouble, employees need to understand the firm’s and society’s norms and boundaries.

cloud_19

Your CFO does the same. Folks are regularly exposed and held accountable to the business metrics and methodologies used to manage and steer the enterprise. The how and why you do what you do is critical for staff to understand, if the firm is going to reach its goals. Likewise, there are a lot of regulations where compliance is essential. They range from those covering all businesses, like SOX or FCPA, to those that are industry specific, like HIPAA or Dodd-Frank.

It’s a good bet that your operations, marketing, and other functions in the company do the same: provide development and tools for success while also pointing out the guard-rails between which actions can be taken in accord with company culture and society norms.

What are you doing for IT leadership? Let’s guess. Odds are you focus on the guardrails. You teach them good passwords, how to avoid phishing emails, perform safe browsing, use corporate data on their mobile devices, etc. All worthy topics but that’s not the half of it. As the fundamentals of your business become increasingly digital they are spending buckets of money on cloud computing. Who is teaching them about cloud? Who is helping the company’s staff make good decisions and avoid bear traps in cloud?

Safe bet it is not you. SaaS vendors go right around you directly to them. Their peers and buddies during meetings and conferences buzz about the latest cloud-based tool – and it’s even free to try! You turn around and surprise, everyone is on Salesforce.com and they are asking you to link it to your old Oracle order management system.

Why not get ahead of the curve and emulate your peers. Teach your users about cloud. Give them the basics, dispel the myths and paint relevant case studies to your industry and environment. Give them the big picture, too. Cloud is pretty prominent in the press these days: all the way from how everyone can use it to how it is transforming whole industries.

NetSuite is bought by Oracle. Salesforce.com elects to use AWS. Workday announces they will use IBM’s cloud for development. Is any of this relevant for your enterprise? Why not write a short note to all users or a post on your internal social media giving your point of view? Are you too busy to write something? Send a link to an article of blog post you particularly liked.

Make yourself the “go to” guy when different parts of the company contemplate using cloud. Do it for the company and do it for you. The CIO and IT’s role are changing and you need to negotiate a difficult path. Some even predict the CIO position will disappear. Nothing is certain but wouldn’t it be better if your users viewed you as a valuable and essential member of the team?

(Originally published Oct 13th, 2016. You can periodically read John’s syndicated articles here on CloudTweaks. Contact us for more information on these programs)

By John Pientka

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption

No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the adoption of new technologies such as the cloud. Keeping data on-premise has long-been considered to be the more secure option; however, ever-increasing incidents of hacking, data breaches and even cyber terrorism within government entities from the IRS to most recently, the Office of Personnel Management (OPM), indicate that change is needed, and fast.

Slowly, but surely, a technology revolution is taking place within the public sector. Due in large part to the introduction of the Obama administration’s “Cloud First” policy in late 2010, the establishment of the Federal Risk and Authorization Management Program (FedRAMP), a standardized approach for conducting security assessments, authorizations and monitoring for cloud technologies, as well as innovations in cloud offerings themselves, cloud adoption among federal agencies is taking off. The General Services Administration (GSA), Department of the Interior (DOI), the Department of Agriculture (USDA), NASA, and even the Central Intelligence Agency (CIA) and NSA are just a few of the many agencies who have embraced cloud solutions in recent months and years. Further, with IDC’s recent Federal Cloud Forecast projecting sustained growth through 2018, the public sector is nearing its tipping point in cloud adoption.

Should this trend continue as expected, below are three reasons that cloud adoption can be the answer to close the federal government’s technology gap.

Availability of Clear Guidelines for Cloud Adoption

In the past, government agencies lacked a clear roadmap for evaluating and selecting authorized cloud providers, making it difficult for the technology to break through in the federal sector. According to the FedRAMP website, this resulted in, “a redundant, inconsistent, time-consuming, costly and inefficient risk management approach to cloud adoption.”

The introduction of FedRAMP has provided agencies with much-needed guidelines and structure to accelerate the use of cloud technology in all facets of the government. Today, cloud systems are authorized in a defined (and repeatable) three-step process: security assessment, leveraging & authorization, and ongoing assessment & authorization. Among its benefits, the federal program estimates that its framework will decrease costs by 30-40 percent and will reduce both time and staff resources associated with redundant cloud assessments across agencies.

Incentives to Focus on Cyber-Security

In October 2015, U.S. federal government CIO Tony Scott professed his support for the cloud during a Google at Work webcast, saying:

I see the big cloud providers in the same way I see a bank. They have the incentive, they have skills and abilities, and they have the motivation to do a much better job of security than any one company or any one organization can probably do.”

He’s right, and his comments represent a stark departure from the general consensus in the public sector just a few short years ago. Applying the same security measures and best practices to legacy, on-premise solutions requires both time and significant spend—both of which the government lacks. The competitive nature of the cloud business in recent years has challenged providers to adopt agile security practices, resulting in solutions that are secure, reliable and execute seamlessly. From email management systems to data storage services, continued cloud adoption at the federal-level will enable agencies to achieve long-term benefits that will eventually be impossible to achieve with on-premise systems, including advanced cybersecurity capabilities, guaranteed business continuity, as well as enhanced performance management functionality.

human-business

Bring Greater Efficiency in IT Spending

In February 2015, the International Association of Information Technology Asset Managers (IAITAM) released a report criticizing the U.S. government on its IT spending. The report suggested that while the federal government spends over six times more on IT per employee than its private sector counterpart, it also wastes 50 percent of its more than $70 billion IT budget due to a lack of standardization and controls. Combined, these factors have created a breeding ground for IT failures and exploits from threats inside and outside government walls. This is further indication that the existing status quo is inefficient and is putting the government (and U.S. citizens) at risk.

Over time, leveraging the “pay-as-you-go” model of the cloud, federal sector can decrease its IT spending, creating new efficiencies. Software and application management for example, which requires abundant resources to oversee in on-premise deployments, is virtually eliminated with a cloud-based solution. From business continuity and software maintenance to eventually, compliance and IT risk-related activities, the onus, falls on the cloud provider, not the customer. Thus, federal IT workers are freed up to focus on more mission-critical initiatives, rather than spinning wheels on inefficient technology, programs and processes.

While it will take some time before the cloud truly takes off in the federal sector, it’s hard to ignore the benefits that both the private sector and forward-thinking government agencies have seen with the technology to date. The time is now to make a change for good. If the U.S. wants to be viewed as one of the most technologically advanced nations in the world, it’s prudent that the government itself practice what it preaches, doing what’s needed to establish the country as a leader, rather than a follower, in this rapidly-evolving digital age.

By Vibhav Agarwal

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance 

With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to these attacks with calls for tighter control and regulations, from the Society for Worldwide Interbank Financial Telecommunication (SWIFT) beefing up its requirements for members to new proposed regulations targeting financial institutions in the State of New York. It is no wonder that as enterprises embrace the public cloud to run their critical applications, (See image) compliance remains one of the top concerns.

Biggest Barriers Holding You Back

cloud-barriers-security

Enterprises used to regard IT compliance audits and certifications, e.g., HIPAA for hospital IT systems or PCI DSS for banks and e-commerce companies, primarily from the perspective of staying on the right side of the law. But this is changing – companies across all industries are now willing to spend on IT security and compliance, not only to deal with legal requirements but also to win customer trust and ensure that they don’t make headlines for the wrong reasons.

Security and compliance in public-cloud environments are fundamentally different from private datacenter security. Old techniques and controls (e.g., connecting to physical switch TAP/SPAN ports and sniffing traffic, installing gateway firewalls at perimeters) do not work in the cloud any more. With compliance playing a key role in IT security and governance, it is important to keep a few guidelines in mind when it comes to managing public-cloud environments.

1. Start with a dose of security common sense: Common data and information security best practices lie at the heart of compliance standards such as HIPAA and PCI DSS as well as of security frameworks such as the CIS Benchmarks for Amazon Web Services (AWS). For example, compliance rulesets for cloud environments typically stipulate password policies, encryption of sensitive data and configuration of security groups. Enterprise IT and security teams would do well to incorporate these rules into their security management, irrespective of compliance requirements.

2. Remember the shared-responsibility model: Public cloud providers such as AWS follow a shared-responsibility model; they manage the security of the cloud and leave security in the cloud (environment) to the customer. These clouds have invested heavily to build security into their products and develop customer confidence. AWS has robust controls in place to maintain security and compliance with industry standards such as PCI and ISO 27001. In going from datacenters to public cloud environments, security administrators need to understand what aspects of security compliance they are responsible for in the cloud. This requires cross-functional collaboration between the operations and security teams to map the security controls in the datacenter to those in public-cloud environments.

3. Stay compliant all the time: In the software-defined world of public clouds, where a simple configuration change can expose a private database or application server to the world, there are no second chances. Enterprises are going from periodic security checks to continuous enforcement and compliance. Businesses that develop and deploy applications in clouds need to bake security and compliance checks into the development and release process. A software build that causes a security regression or does not meet the bar for compliance should not be released to a product environment. Enterprise IT needs to ensure that the tools they use for compliance monitoring and enforcement allow them to check applications for compliance before they are deployed.

4. Automate or die: Manual security and compliance processes don’t work in the dynamic, scalable world of the public cloud. When a business’ cloud environment spans hundreds or thousands of instances across accounts, regions and virtual private clouds, just the process of gathering the data required to run a compliance audit can take days or weeks, driving up the time to compliance and increasing the risk of errors. Even a team of qualified security personnel may not be able to detect vulnerabilities and respond in a timely manner. Automation is key to survival in the public cloud. It is no wonder that Michael Coates, the trust and infosec officer of Twitter, said “Automate or die. This is the biggest thing I stick by in this day and age.” In selecting the tools to manage compliance in cloud environments, enterprise IT must regard automated data aggregation, compliance checking and enforcement of security gold standards as table stakes.

5. Don’t just find it, fix it: There is an abundance of security-monitoring products in the market today that allow administrators to find security misconfigurations and vulnerabilities but do not offer the control to fix these issues. These tools are limited in scope and utility and force enterprise IT to use a patchwork of tools to manage the security and compliance lifecycle. Businesses should pick comprehensive “find it, fix it, stay fixed” platforms that do not stop at identifying issues with the environment but offer the tools required to fix them and put safeguards and controls in place to ensure that security best practices are enforced.

Public clouds are transforming the world of enterprise IT by offering unprecedented agility and a pay-as-you-grow operational model. Clouds are also changing the rules of the game for IT security and compliance management by offering new controls and capabilities. The tools and processes that served IT well in datacenter environments will not work in the public cloud. It is time for security and compliance to be transformed as well.

By Suda Srinivasan, Vice President of Growth at Dome9

suda_dome9Suda is the Vice President of Growth at Dome9, where he oversees marketing and customer growth. Prior to Dome9, Suda held a senior marketing role at Nutanix where he was responsible for defining, communicating and driving the execution of the go-to-market strategy for the company’s enterprise cloud platform. Suda is a seasoned leader with extensive experience in technology, having worked in engineering, strategy consulting and marketing roles at Nutanix, Microsoft, Coraid and Deloitte

Is Complete Cyber Security Possible?

Is Complete Cyber Security Possible?

Cyber Security Concerns

Every minute, we are seeing about half a million attack attempts that are happening in cyberspace.” – Derek Manky, Fortinet global security strategist

Pricewaterhouse Coopers has predicted that cyber security will be one of the top risks facing financial institutions over the course of the next 5 years. They have pointed at a number of risk factors, such as the rapid growth of the Internet of Things, increased use of mobile technology, and cross border data exchange, that will contribute to this ever growing problem.

Gartner has estimated that by 2020, the number of connected devices will jump from around 6.4 billion to more than 20 billion connected devices. In other words, there will be between two and three connected devices for every human being on the planet. Derek Manky of Fortinet, told CNBC that “The largest we’ve seen to date is about 15 million infected machines controlled by one network with an attack surface of 20 billion devices. Certainly that number can easily spike to 50 million or more“. So in a world where Cyber Security seems almost unattainable, is it still possible for you, or for large companies, to remain protected?

threat-cybersecurity

According to Cross Domain Solutionscomprehensive security is possible by making all security data accessible and automating security procedures”, which allows threats to dealt with in real time. They suggest an approach focused on data confidentiality, data integrity and the authenticity of users and data placeholders. Although it is theoretically possible, this is unlikely to provide total cyber security in practical situations.

The expansion and widespread adoption of the Internet of Things (IoT) has become the most pressing cyber security issue over the last 5 years. Smart phones, smart watches, smart TVs and smart homes, amongst other devices, have increased the surface area for hackers to take advantage of exponentially. This combined with the problems of perimeter security in cloud-based services, the sheer size of data collection by IoT devices, and the lack of security on many modern IoT devices, mean that complete cyber security (for businesses or individuals) will become increasingly more difficult. In a move that shocked the world earlier this year, hackers made off with tens of millions of dollars from Bangladesh’s central bank by using malware to gain access to accounts. Cyber Security is a very real issue for any business that has valuable information or assets stored digitally.

james-lewisIt has been suggested that we should focus on strategies to reduce risk that use formulas such as cyber risk = threats X vulnerabilities X consequences; thus by reducing one of the factors to zero we can achieve complete Cyber security. The Common Vulnerabilities and Exposures list has more than 50,000 recorded vulnerabilities (with more added every hour), so it is almost impossible to ensure your network can deal with an incessant wall of hackers trying to get in. James Lewis, a cybersecurity expert at the Washington DC-based Center for Strategic and International Studies (CSIS), commented recently that businesses need to stop worrying about preventing intruders from accessing their networks. They should instead be concentrating on minimising the damage they cause when they do gain access. According to the Cisco 2015 Annual Security Report, “Security is no longer a question of if a network will be compromised. Every network will, at some point, be compromised”.

Fortunately for the tech world, the same capabilities that make networks more vulnerable can help to strengthen defences as well. Financial institutions are able to utilise big data analytics to monitor for covert threats, helping them to identify evolving external and internal security risks and react much more quickly. Whilst total cyber security may not be practically possible, the technology exists for businesses to be as security conscious as they feel they want to be. Both consumers and businesses should be assigning cyber security as the highest priority.

By Josh Hamilton

SAP Digital Consumer Insight: SAP’s Data-as-a-Service Tool Helps Business Owners Know Their Customers

SAP Digital Consumer Insight: SAP’s Data-as-a-Service Tool Helps Business Owners Know Their Customers

SAP’s Data-as-a-Service Tool

There was a point not too long ago when futurologists believed that all retail would be going online, with anonymous transactions and drone deliveries meaning you would never have to leave your couch to satisfy all your shopping needs. In fact, the opposite has happened. Brick and mortar retail stores have embraced and incorporated big data, cloud computing and the internet to deliver a much-improved retail experience for business owners and consumers alike.

When Jud and Julie Soderborg opened the fashion boutique Koan in New York’s East Village, they wanted to really understand the identity and the behaviors of the people who were walking by their store, and could be potential customers. So the husband and wife team initiated a three-day data gathering project using SAP’s Digital Consumer Insight tool. They began by focusing on when foot traffic peaked and when it was at its lowest, then dug deeper to find out where people were coming from, who they were in terms of age & gender and even what sort of devices these people were using.

Peak Traffic

When they collated all the data, they discovered that the foot traffic past their location was primarily millennials from the Williamsburg / East Village area who were using Apple devices. As a result Koan was able to shape their offerings accordingly and target their marketing tone to suit the foot traffic, confident that they were appealing to the correct demographic.

You can read more of their story, as well as many more use cases here: http://digital.sap.com/sap-digital-consumer-insight-case-studies-and-use-cases

E-commerce retailers have known for a long time who their customers are, due to their ability to track their clicks and their online behavior. SAP’s Chief Digital Officer Jonathan Becher explains, “This offering does to retail stores what Web marketing has done for websites.” For example, an online retailer can track the path to purchase, the time to taken to get there and the demographics of a consumer. “What we’ve done for the first time is to take all this information that people have figured out in the digital world, and make it available to the physical world.

Where are they coming from?

The benefit of these insights can be applied in a number of ways for retailers. Everything from proximity marketing to location planning, sales strategies and campaigns will benefit from the snapshots provided by SAP Digital Consumer Insight. Through the data, retailers are striving to achieve a way of delivering a consistent, personalized product mix to customers across multiple channels that local consumers will relate to. It stands to reason that the deeper the understanding of customer behavior that there is, the easier it becomes to attract loyalty and increase the conversion rate and average basket value of purchases.

Consumers need not fear that their privacy is being violated in any way. The data which is collected and presented via Digital Insights is anonymized and aggregated, thus giving the business owner a snapshot of the traffic in the area while maintaining the privacy of the individuals.

SAP built its formidable reputation working with big businesses, but 80% of their customers are small and mid-sized so the company learned how to take what works at enterprise-level and adapt it for smaller businesses that realize how much they can benefit from actionable information.

Small business owners don’t have the time, skills or resources to build complicated data analysis systems. SAP Digital Consumer Insight is the perfect vehicle to address those concerns. Consumers can simply purchase a single data ‘Insight’ for $439.00, or they can select a bundle of five data ‘Insights’ for $1,429.00 – and begin to see their Insights instantly.

Visit the SAP Store to purchase the SAP Digital Consumer Insight package and take a massive step towards understanding who your customers are and what they need.

Sponsored spotlight series by SAP

By Jeremy Daniel

Around The Cloud – Top Tech News For The Week

Around The Cloud – Top Tech News For The Week

Amazon and VMWare

The biggest corporate news this week was that Amazon and VMWare are now partners, in a bid to win corporate customer’s hearts by combining the two. The new “VMWare on AWS Cloud” service will be available in the latter half of 2017. Dell and VMWare will be teaming up together to sell this new service, which promises to make it a lot easier to combine the usage of VMWare’s cloud software with AWS services, Fortune Magazine reports.

Cloud Security

cartoon-comic-data

Cloud security has also been the hot buzz word of the week again as more statistics have been released revealing flaws in the way companies are currently handling the cloud. InformationWeek reported the most shocking statistic by far: 80% of IT professionals report that their users are setting up and using unapproved cloud services. 40% claim these users have gone behind their backs at least five times to make this possible. Cloud storage services top the list, but email services such as Outlook and Yahoo are included as well. It is suggested that IT professionals educate their users on the risks involved in using such services unapproved, and restrict what websites they visit and software they install.

It’s very worrisome indeed that with so many employees using unapproved cloud and email services, cloud security Netskope revealed that 48% of the companies they surveyed don’t scan their cloud services for malware, either. 12% said they were unsure if they scan or not… but 57% of all the companies surveyed said they had found malware stored in their cloud. Interestingly, their survey also reveals that while 49% of the data stored in the cloud is known to these companies, 45% of the data stored is completely unknown to them. When asked about security worries, the top concern among the companies covered was a loss of control over the security of data and end-user. Next was loss or theft of intellectual property and compliance violations. BetaNews gives the full scoop on the statistics of this report.

So it really should come as no surprise that 43% of IT professionals say that it is difficult to secure data that is stored in the cloud! Over at eSecurityPlanet, an article on how 73% of IT professionals would prefer to store data locally was one of the top trending topics in technology this week. Another eye catching number in this story includes that 90% of the IT professionals interviewed believe that the cloud is forcing them to learn new job skills. “The cloud is ideal for businesses that need a cost effective, scalable and flexible means to transform their IT environments,” Philip Lieberman, the president and CEO of Lieberman Software, said in a statement. “Yet IT professionals are still reluctant to put sensitive data in the cloud because they say it is difficult to secure… What organizations need to understand is that the same security problems they face on premises follow them into the cloud… Migrating to the cloud doesn’t mean they face any more or less security risk than keeping data on premises.

By Jonquil McDaniel

CloudTweaks Comics
Comparing Cloud Hosting Services

Comparing Cloud Hosting Services

Cloud Hosting Services Cloud hosting service providers are abundant and varied, with typical structures affording the reliability of virtual partitions, drawing resources externally; secure data centers; scalability and flexibility not limited by physical constraints; pay-per-use costing; and responsive load balancing for changing demands. While high end (and high price) services offer an extensive range of…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Fintech Investments Are Seeing Consistent Growth

Fintech Investments Are Seeing Consistent Growth

The Financial Services Cloud Fintech investment has been seeing consistent growth in 2015, with some large moves being made this year. The infographic (Courtesy of Venturescanner) below shows the top Fintech investors and the amount of companies they’re currently funding: Just this week, a financial data startup known as Orchard Platform raised $30 million in…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…