Cloud and data breach prevention

security

Today’s technology advancement has one obvious parallel: increasing security threats. One such issue which has been growing both in number and intensity is data breach. And while many businesses have turned to the cloud in the hope of improving security, there is still a chance of a collision between data breaches and cloud usage. But don’t panic just yet, there are measures you can take to avoid the headache of a cloud and data security breach.

The cloud opens up some great tech advancements for businesses and is here to stay. However, as with all tech developments, you need to also be aware of any vulnerabilities and security issues as they change and develop at the same time too. If you use the cloud and want to proactively prevent cloud-and-data security breaches then here are five tips to follow:

  1. Know your cloud apps: Get a comprehensive view of the business readiness of apps and which ones render you more or less prone to a breach. Ask yourself these questions: Does an app encrypt data stored on the service? Does it separate your data from that of others so that your data is not exposed when another tenant has a breach? The idea here is to know exactly what each cloud service employed offers and how your company uses them.
  2. Migrate users to high-quality apps: Cloud-switching costs are low, which means that you can always change and choose apps that best suit your needs. If you find ones that don’t fit your criteria, take the time to talk to your vendor or switch; now more than ever you have choices, and the discovery process in step one will help you find out what these are.
  3. Find out where your data is going: Take a look at your data in the cloud. Review uploads, downloads, and data at rest in apps to get a handle on whether you have potential personally-identifiable information (PII), or whether you simply have unencrypted confidential data in or moving to cloud apps. You wouldn’t want cloud-and-data breaches with this critical data.
  4. Look at user activities: It’s important to understand not only what apps you use but also your data in the context of user activity. Ask yourself: From which apps are people sharing content? According to tech news source, VentureBeat, one-fifth of the apps they tracked enable sharing, and these aren’t just cloud storage apps, but range from customer-relationship management to finance and business intelligence. Knowing who’s sharing what and with whom will help you to understand what policies to best employ.
  5. Mitigate risk through granular policy: Start with your business-critical apps and enforce policies that matter to your organization in the context of a breach. For example, block the upload of information covered by certain privacy acts, block the download of PII from HR apps, or temporarily block access to vulnerable apps.

The key to preventing a cloud-and-data security breach lies in careful attention to your cloud applications and user activity. Analyzing your apps and looking into user activities might be time consuming, but the minimization of cloud-and-data security breaches makes this task worthwhile. Looking to learn more about today’s security? Contact us and let us manage and minimize your risks.

Published with permission from TechAdvisory.org. Source.

Woz and cloud problems of the future

Any new technology that is profoundly, or even remotely, popular will always have people who love it and people who hate it. Often, the opinion of experts in the same field is so widely varied that normal users are left wondering who to trust. One such debate that rages, almost daily in some circles, is over the cloud. One well-known tech guru has recently said he’s worried about the cloud.

Mike Daisey is an American monologist who did a show about Apple’s production plant (FOXCONN) in Shenzhen China that turned out to contain false facts. In August he updated his show and even brought on a special guest, Steve Wozniak (Woz), Co-founder of Apple.

On the show, Woz talked about many things, but one of the topics resonated with the tech crowd. The topic was the security of the cloud and ownership of data and files within it. Woz stated, in no uncertain terms, that, “there are going to be a lot of horrible problems in the next five years.”

He went on to explain that the reason he felt the next few years will be tough is due to ownership of information stored in the cloud. He explained, “a lot of people feel, ‘oh, everything is really on my computer’, but I say the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it…I really worry about everything going to the cloud.”

Woz and other critics of the cloud are worried about who really owns your personal information in the cloud, and how much actual control you have over data stored on a cloud provider’s servers – aka. the cloud. The underlying issue around this reservation is the question of what will happen to all of your data if there is a massive breakdown at remote storage locations. Some users had a recent glimpse into this possibility when Amazon’s data center was struck by lightning causing cloud services like Pinterest and Instagram to be unavailable for hours. Despite the fact that the issue was fairly small, groups of people were mad at not being able to access their data.

Users may be reserved in fully trusting cloud solutions and the companies offering them but the cloud is quickly becoming a backbone to many business oriented solutions. Chances are, you are using at least one cloud service right now. Many IT companies believe that the cloud is the way to go and strive to take steps to ensure ownership of stored information is as clear as possible.

What are your thoughts on this issue? Are you worried about cloud solutions or do you embrace them? Let us know.

Published with permission from TechAdvisory.org. Source.