Cloud Computing Round-Up Week 19th-26th Of Jan, 2014

data-storage

Cloud Computing Round-Up Week 19th-26th of Jan, 2014 Here’s a round-up of the 3 top cloud stories making the headlines this week. Microsoft To Store Foreign Users’ Data Overseas – As the NSA gets grabby with users’ data, when those users happen to be using US based computing services, Microsoft have made a controversial move to

Enjoy Full Article

3 Keys To Keep Enterprise Clouds Secure

Michelle-Drolet

3 Keys To Keep Enterprise Clouds Secure Outsourcing has won out over ownership, and the rush to the cloud continues to gather pace. Where security is concerned there are two major trends that threaten to expose your company to unnecessary risk. There’s a lack of planning and due diligence when choosing cloud providers, and there’s

Enjoy Full Article

Cybercrimes And The Growing Importance Of SDN Technology

Moshe Ferber

Last months Cloud Security Alliance Central Eastern Europe Summit gave a good opportunity to learn about the Cloud Computing market in areas of Europe that are less reviewed. The congress, held in the center of the old city of Ljubljana, provided interesting mixture of Information Security professionals along with various cloud providers and end users

Enjoy Full Article

Ransomware And Backup On The Cloud

security-cloud

Ransomware And Backup On The Cloud Ransomware is a kind of malware that withholds some digital assets (mostly user’s data) from its victims and asks for payment for their release. Ransomware could be the best reason yet to use cloud data storage systems. Over the past several weeks, many Windows users were infected by CryptoLocker

Enjoy Full Article

Big Problems, Big Payoff: Setting Up Your Own Cloud Server

cloud-build-scale

Big Problems, Big Payoff: Setting Up Your Own Cloud Server Your boss just informed you that you need to start migrating all of your server applications to the cloud. How would you go about doing that? Is it even possible? Your mind starts to whirl with the issues you can already see cropping up over

Enjoy Full Article

What Should You Look For In A Cloud Security Vendor?

Protecting the security of your cloud data during its transmission, storage, and access is an ongoing, fundamental concern as technology continues to evolve, intrusion possibilities increase, and BYOD becomes more common. Here are the five areas to consider when evaluating how the security of your cloud vendor stacks up. How is My Data Physically Protected?

Enjoy Full Article

The Cost Advantages Of Hosted Disaster Recovery Solutions

disaster-recovery

The Cost Advantages of Hosted Disaster Recovery Solutions There’s a common saying among datacenter professionals that no matter how much it costs to have a disaster recovery program, the cost of not having one is far greater. This was often used to convince skeptical CEOs of the need to build duplicate datacenter infrastructure despite its

Enjoy Full Article

The Reality Of Government Intrusion Risks For Cloud Businesses

The Reality of Government Intrusion Risks for Cloud Businesses The concerns around government intrusion in cloud stored data, especially to reveal user sensitive information are amongst the most discussed topics within the cloud community. Although the concerns are often exaggerated, there is some truth in these concerns and sooner or later a cloud service provider

Enjoy Full Article

Bring Your Own Device (BYOD) – Provides Tremendous Boost In Employee Satisfaction

Bring Your Own Device (BYOD) – Provides Tremendous Boost In Employee Satisfaction Unless one has been living under a rock or has been magically transported from the middle ages, one might have noticed the burgeoning trend in mobile devices. The technology has reached a point where what many would consider science fiction a decade ago,

Enjoy Full Article

Steps To Secure Data In The Cloud

security-image

Steps to Secure Data In the Cloud Cloud computing and storage security is often one of the main stumbling blocks cited by those who’d like to reap the benefits of moving to the cloud, but believe they cannot. Data security is extremely important, but for many enterprises and markets, there can be no compromise in

Enjoy Full Article

Virtualization Spells “Money” For SMB IT Consultants In 2013

Virtualization Spells “Money” for SMB IT Consultants in 2013 Listen up, SMB IT guys. Consider this: The typical small and medium business server uses about 10% of its computing power. But small businesses continue to segment their servers—one server per core function—as companies like Microsoft, Dell, and HP have recommended for years. And while that’s definitely a best

Enjoy Full Article

How To Build HIPAA-Compliant Cloud Applications

How to build HIPAA-Compliant Cloud Applications (Health Insurance Portability and Accountability Act) The Health Insurance Portability and Accountability Act, enacted by the United States Congress in 1996 was created to protect health information coverage for employed people and their families when they become unemployed, either because they change their job or they lose it. According

Enjoy Full Article

What You Don’t Know About The Google Apps Cloud CAN Hurt You

spanning-backup

What You Don’t Know About The Google Apps Cloud CAN Hurt You The majority of the world’s computer users have used or are currently using Microsoft Office, Open Office, or one of many similar products for their desktop business application needs. A recent entrant to the fray, Google Apps boasts only about  50 million current users,

Enjoy Full Article

Press Release: Cloud Security Survey Reveals Lack Of Business Policies Governing Rogue Cloud Usage

Cloud Security Survey Reveals Lack of Business Policies Governing Rogue Cloud Usage Even as Data Protection Remains Highest Concern with the Cloud Forty Percent of Companies Deny Cloud Usage Despite Employee and Departmental Use of Web-Based Applications and Mobile Devices Outside of IT Control Seattle, Wash. – November 6, 2012 – New research tracking trends and

Enjoy Full Article