Protecting Your Customer’s Data in the Cloud Cloud storage has grown significantly in popularity over the past few years. With more cloud services popping up daily, it is imperative that cloud storage providers protect their customers’ data while it is stored in the cloud. While most startups still keep customer security in mind, some newer cloud storage services need to upgrade their security significantly to protect their customers’ data. Remember: It Is Your Customer’s Data What a lot of cloud services do not realize is that the data that they protect does not belong to them; it belongs to their
How Are Canadians Affected By The USA Patriot Act And Cloud Computing? Whether Canadians like it or not, they are affected by the US Patriot Act. While some of the previous issues have been settled already, some new issues are already popping up – issues with cloud computing. The US Patriot Act, otherwise known as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, was passed after the World Trade Center attack in September 2011. The law provided a way for US law enforcement agencies to seize business records and block electronic communications.
Answers To Gartner’s Six Cloud Computing Risks Cloud computing has been the subject of ever-increasing hype. Anything exposed to such publicity is always accompanied by criticism, whether it be constructive or destructive. Gartner, an information technology research and advisory firm, has completed a report which signifies some crucial risks in the cloud computing industry. Given below, with appropriate answers to each, are six risks highlighted by the Gartner report. 1: Privileged User Access: A risk which deals with who manages the data of an organization in the cloud. Interestingly, the way most datacenters operate is that there are not very
BYOD Is In—Bring Your Own Cloud, Not So Much As employees continue to bring personal mobile devices and laptops into the workplace, most businesses have resigned themselves to dealing with the security and management headaches of the new BYOD reality. But now, with the growing popularity of cloud storage and synchronization services, companies have found themselves facing the next wave in the consumerization of IT: “Bring your own cloud” or BYOC. In large part due to the flexibility of cloud collaboration services, it’s not uncommon for employees to telecommute from home or from one office to another. Many of these
Data Security in the Cloud: Solutions for Consumers and SMBs A recent small business cloud computing survey from Microsoft found that a chief concern of potential SMB cloud customers is the security and privacy of their data. A full 70% of small businesses are concerned about where their data is stored. Just over half of all SMBs cite data privacy as a potential deal breaker for adopting cloud services. And only 36% of businesses think their data is as or more secure in the cloud than their current on premises solution. Most data security and privacy concerns revolve around four
Taking the bull by the horns—Secure Identity, Information, and Infrastructure Continued From Part 3 Public cloud computing requires a security model that reconciles scalability and multi-tenancy with the need for trust. As enterprises move their computing environments along with their identities, information and infrastructure to the cloud, they must be willing to give up some level of control. To do that, they must be able to trust cloud systems and providers, and verify cloud processes and events. Important building blocks of trust and verification relationships include access control, data security, compliance and event management—all security elements well understood by IT departments