Why The Cloud Is As Secure As Your PC

Why the Cloud Is As Secure

Recently, a great portion of hype in the technology sector is related to cloud computing security and reliability. Recent service interruptions experienced by leading cloud services providers like Amazon, in combination with security issues and credential leaks that occurred in services delivered by Sony and Google’s Android operating systems raised questions about the overall security and safety of cloud-based solutions.

There is no simple or straightforward answer to the question whether the Cloud is a secure place for storing data, conducting transactions and maintaining corporate databases. Moreover, one should distinguish between private, public and hybrid clouds used to store corporate data run business applications. Most security experts agree that cloud-based solutions are as secure as offline software and storage products and services that run in a corporate environment, on a corporate server and are isolated from external networks.

Actually, a private cloud i.e. most clouds deployed by enterprises, small and large ones alike, can experience downtime as often as public clouds like those offered by Google and Amazon, for example. Private, public and hybrid clouds utilize infrastructure, hardware and software that is similar to the ones used in corporate private networks; therefore, IT specialists face the same problems in a “traditional” and a cloud environment. Over 200,000 Google’s Gmail users saw their email accounts emptied in a day, loosing emails and other documentation they archived for years. However, corporate users could experience the same troubles should a company server crash, deleting data stored in their corporate email accounts. No one is insured against hardware faults and Google later admitted that the mysterious loss of data occurred due to a combination of hardware and software faults.

The human factor should not be underestimated, too.

Government agencies around the world avoid using cloud services offered by corporate providers because of the risks related to Data leaks and data protection in the Cloud. Actually, most reputable providers of cloud services apply strict data and software access policies similar to those implemented by Government bodies. On the other hand, data leaks within the government-run companies and agencies occur more frequently than information leaks originating from corporations. If an American sergeant managed to transfer sources to Wikileaks, thousands of classified government cables stored within the U.S. Army computer networks, one should bet that the same can happen to myriads of files and emails stored in public cloud services. The greatest danger is related to targeted attacks and business espionage while individual users should beware mostly of identity theft.

Reliability of cloud services is another issue that should be taken into account. A growing number of providers offer cloud services and products while Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) are now commonly used to reduce corporate costs. Other enterprises rely on Infrastructure-as-a-Service to run their business but in all these scenarios business depends on external resources to run smoothly their everyday operations.

Thus, reliability of cloud products and services is now a major issue while many IT specialists admit they are not convinced in the reliability of cloud solutions deployed within their respective organizations. For example, an enterprise greatly reduces its software licensing fees and payroll costs by deploying a cloud software platform but such a solution can cost dearly if the PaaS provider does not offer an acceptable reaction time in case of malfunctions and service faults.

Once again, the same troubles can occur in a “traditional” software environment where a platform is not supported in an appropriate manner or a company lacks experienced IT staff. Connection and processing speed is also a concern when the issue in hand is cloud computing but this can be subject to a separate article.

In reality, the Cloud is as secure and safe as is a personal computer connected to a closed corporate network, provided that the network is maintained by well-trained specialists and all available and applicable security and safety measures are implemented. No complete security is available in an interconnected environment where practically all devices and gadgets are able to connect to a sort of network.

Apart from imperfections offered by software and hardware, the human factor is still the main threat to security and safety in the Cloud.

By Kiril Kirilov

Tunio Zafer

Questions To Ask Every Cloud Storage Provider

Cloud Storage Provider Questions As with many new technologies, attitudes toward cloud storage vary. Telephones were immobile; wearables perhaps unwarranted. And now, the global cloud storage market was estimated at $21.1 7 billion in 2015, ...
Kaylamatthews

What You Need to Know – IoT and Real-Time Operating Systems

Real-Time Operating Systems A real-time operating system, or real-time OS, appears to execute tasks while using a single processing core simultaneously.  However, what's really happening is that the tasks' response time is so fast that ...
Kayla Matthews

Higher-Ups More Likely to Break Policy, Data Breach Survey Finds

Data Protection Policies In an ideal scenario, the people at the highest levels of an organization would be the most likely to abide by data protection policies. Then, their positive behavior could set an excellent ...
Anita Raj

A Winning Data Strategy Series Part 4: Are Your Data-driven Insights Driving Business Results?

Are your data-driven insights driving business results? This is the fourth piece of a 5-part series on plugging the obvious but overlooked gaps in achieving digital success through a refined data strategy. How would you ...
Kevin Ovalle Anderson Frank

How cloud-based business management can help an SMB go global

Global SMB Business Management Most companies today are familiar with the cloud; using software-as-a-service (SaaS) apps and customer relationship management (CRM) for years. However, many businesses are now running the whole show from the cloud ...
Patrick Joggerst

Living on the Edge: The New Real-Time Communications Security Risks

Real-time communications Security Risks As more and more people have been forced to work remotely due to the global public health crisis, collaboration platforms have unexpectedly saved the day for millions of businesses and allowed ...