top of page
Search
  • securebytesolutions

Security and Cloud Computing


The potential of cloud computing to provide powerful computing and data storage options for even small, bootstrapped businesses at very competitive prices has generated a lot of excitement within the industry. However, many cloud computing enthusiasts overlook critical issues regarding data security. This is understandable given the large names behind the largest cloud computing projects worldwide. Google Apps anyone? Companies like Oracle and Cisco are likely to bet their fortunes on cloud computing. In any case, security should be a top priority for them, given their passionate approach to network security. We can all benefit from the trickle-down effect they have on protecting our data against all security breaches.


You are right?

Yes and No are two different things. In a 2009 speech, John Chambers, Cisco CEO, stated that cloud computing offers many opportunities but also presents a security nightmare. It's a good thing. Cloud computing providers need to address security concerns in order for customers to be comfortable.


· Multi-tenancy issues. Cloud computing is by definition shared data storage between a number users spread across multiple locations and companies. Providers need to be able assure corporate clients that they will not allow anyone to access their account or information - inadvertently or otherwise.

· Data recovery and loss. What happens in case of data loss due to a natural disaster? Is there a regularly tested and rigorously maintained backup solution that can be used to recover data? Is there a fail-safe system in place that prevents data loss from one client? What happens if the cloud computing provider goes out-of-business, is purchased or taken over or declares bankruptcy. How can clients be sure that their confidential corporate data will not be lost during the transition?

· Hosting information. Is the data actually stored where? Is the data stored in Silicon Valley, Chicago or Bangalore? Who actually provides hosting services? Is the third-party host provider verified to meet industry standards?

· Security updates and tests. How often does the platform or software get updated? Is it regularly tested? Is the provider able to monitor and prevent security breaches during and after testing? It is important to ensure that no unauthorized users, whether they are from your company, your provider, or a third party have inadvertently gained access to your information.

· Compatibility with different security policies. Does the provider offer a different security policy for sensitive client or corporate information? Does the provider meet your security standards? How about third-party businesses with which the provider does business? Who may be involved in any way with the service? Do they also adhere to your corporate standards?

· Collaboration issues. Cloud computing's ability to encourage collaboration between users with external parties or internal staff is one of its most attractive benefits. Is there a system in place by the platform or software provider to ensure that this collaboration does not compromise security?

· Human resources. Who will have access the company information of your provider? Who is responsible for data security? Can they be reached to answer any questions? Are they able to answer all your questions to your satisfaction? What are their experiences and backgrounds in network security and corporate data?

· Reports and frequency. What is the downtime frequency of company servers? Are they willing to share their downtime reports with you in order for you to investigate the reliability of their network? Are they able to provide you with downtime reports so that you can verify the reliability of their network?

· Cyberattack defense. Cloud computing is unavoidable. Cyberattacks are salivating at the large amounts of sensitive information contained in a few services.


This is only a small selection. This is just the beginning. The Qnap panama top cloud computing providers spend a lot of their waking time - and I'd wager some of their dream’s hours - thinking about security and how they can be proactive in dealing with increasing threats to their clients' businesses. This is an ongoing conversation that Mother node is excited to be part of and that will continue to dominate our industry in the future.

11 views0 comments
bottom of page