As public cloud use becomes more widespread, companies must address certain questions that surface with implementation. Security is often part of the discussion, with IT professionals tasked with reassuring line of business managers about the safety of storing data in the cloud.
With any data storage — public or private cloud, on-site, or a hybrid solution — there are security risks to address. The novelty of cloud technology often makes it of particular concern to managers. They want to know that measures are being taken to ensure the safety of data. They also often embrace certain myths about security.
The “black or white” myth: While data stored in the public cloud is not inherently unsafe, it’s not impenetrable, either. One of the myths of public cloud data storage is double-sided, with some believing that it cannot possibly be safe and others believing that the cloud will not allow a security breach.
Neither statement is completely true. It’s important when accessing a cloud solution that you carefully assess security risks and address them with your vendor in writing. You should not only determine which party is responsible for each aspect of security, but also who takes responsibility for damages in the event of a breach.
Public cloud options are not safe by accident; instead, they are safe because enterprises and vendors work together to adopt robust security features which often outperform any security system used in an on-site system.
The vulnerability myth: Don’t imagine that, because you have humans working on your systems, that you’ll always have some unsolvable vulnerability. It requires training and education, but you can help your staff support your security policies.
Passwords written on sticky notes adhered to a monitor and out-of-date firewalls are just two examples of the ways that casual administration of security policies can leave your system vulnerable. Shadow IT, or the unauthorized downloading of apps and other technology, can also create vulnerability.
Don’t throw up your hands and assume your system can never be safe. With the right training, your employees can be some of your best security resources. Once they know what’s at risk, they can work alongside your IT professionals to ensure a safe public cloud environment for your company.
At TeleConsult, our cloud and IT services bring you the performance and reliability you need to realize growth. We specialize in helping companies move forward as the marketplace rapidly changes, and we do it by offering unparalleled performance, flexibility, and scalability. Contact us today to find out more.
Whenever company data needs to be transferred from one place to another, a series of questions should be answered, particularly in cloud-based migrations.
Game-changing technology has opened new possibilities for businesses over the last decade. The new landscape is filled with start-ups that wouldn’t have been possible five or ten years ago, and the major player in that evolution is cloud technology. Rather than requiring costly hardware investments, virtual machines and pay-as-you-go applications offer the flexibility and agility demanded in today’s global marketplace. Yet, some companies are still hesitant to embrace the change, and the delay can be costly.
In 1989, one Dr. Joseph Popp mailed a set of floppy disks innocuously labeled as “AIDS Information Introductory Diskettes” to several thousand members of a mailing list of researchers. These disks, when read by the computers, replaced and renamed system files so that when the computer was later booted up, it would display a fake license agreement and ask that the user send $189 to a P.O. box in Panama in order to continue using the computer. In doing so, he set the pattern for a type of virus which would come to be known as ransomware.
Gartner’s
Many small and medium businesses (SMBs) are vulnerable to security threats. Whether they’re aware of the risks and know that they need improvements or they’re operating in blissful ignorance of the costs of a cybercrime, discussing security and data protection upgrades can be challenging. Many of these companies consider themselves a low priority target for attackers, or simply feel that their current antivirus is adequate protection against an attack. These businesses typically focus more thought on daily operations than on whether or not they are at risk for a data breach.
Each year it becomes more and more likely that a given company will experience some form of data breach. Most companies now have plans in place to deal with these events, but many of them do little beyond that. It is still relatively rare for a company to drill or practice putting their plan into effect, but having a plan and being prepared are not always the same thing.