Tuesday, August 14, 2012

Cloud Computing - Is It Secure? | AVG (AU/NZ) Blog

Any business owner or IT professional who attended CeBIT 2012 in Sydney earlier this year (and a big thanks to those of you who stopped by the AVG (AU/NZ) stand!) would know that cloud computing?is the biggest trading buzzword?in not just technology circles but in the wider business media too.

In reality, there is nothing new about the ?cloud?. If you use a managed service provider, or if you or your employees use Gmail, Google Docs, SalesForce, DropBox, Flickr or a host of other web-based applications in your daily business, you?re already there.?

The theory is simple ? cloud computing becomes a means by which you can purchase your technology as an online service supplied via the Internet, so that you only use as much processing power and storage space that you need at any given time. The benefits to your business are obvious ??these services are flexible, scalable, cost-effective and (for the most part!) easy to use.

But, as the business world continues to rush towards cloud computing like a breathless high-schooler towards their latest teen idol, we need to ask ourselves the question ??is cloud computing secure? Unfortunately, due to the lack of properly defined cloud security standards, the jury is still out.

According to Matt Lowth, the principal security architect for National Australia Bank:

?The biggest problem with the cloud is that you can?t get a consistent definition of what is secure?And if I can?t get the same answer from three different vendors, how do I know what secure is??

So, before some much needed clarity arrives, what can your business do to ensure your data?s security online? Here?s five ideas:

Use and enforce a strong password policy

Whether or not you consider your business to be a consumer of cloud computing, you probably already have a heap of data that lives on servers elsewhere. Your first priority needs to be making sure that a would-be thief isn?t able to steal, impersonate, crack or eavesdrop on your authentication details to these remote servers. Choosing a strong password, and choosing a different password to each cloud service is essential. Ideally, both username and password should be hashed and salted using a strong encryption algorithm. You?d be amazed at the sheer number of compromised email addresses and passwords that are compromised by publicised hacks.

Use a trusted and fully featured Internet Security suite

Strong passwords are essential, but can be rendered irrelevant if your network or any of its devices have been compromised by keylogging or data-stealing malware. You can?t control what happens on servers in the cloud, but by securing each device on your network you are ensuring that the communication between your network and the cloud server is kept as private as possible. AVG Internet Security Business Edition has been rated by the experts at Tolly as one of the fastest and easiest to use SMB security solutions ? if you haven?t already, we?d invite you to try it for yourself.

Use and enforce a strong acceptable network usage policy

Cloud computing at work is unfortunately not just confined to how your business conducts itself. If given the opportunity, your employees (especially if they are notoriously unreliable and pampered Gen Y?ers) will most likely use at least part of their day to keep themselves up to date with their own cloud providers (Google+, Pinterest,?etc.), which in turn raises your business? target profile for cybercrime.

Have a Bring Your Own Device (BYOD) policy in place

Your password and acceptable usage policies are easy enough to implement on your own infrastructure (you own it, you make the rules!). However, with more than 60% of the working population having access to a mobile computing device such as a smartphone or tablet, many of your employees will be able to access your cloud services with their device. Your policy needs to ensure that their device is a) properly secured from cyber attacks?b) properly secured from physical theft c) kept up to date at all times d) given restricted or privileged access to your company network.

Pick your cloud providers carefully

When you contract a cloud service provider to deliver a service, you need to be aware that their security vulnerabilities become your vulnerabilities. Sure, nobody?s perfect (as proven by the recent Sony, Steam and Yahoo! breaches), but until such time as cloud providers are required to adhere to a strict security standard, you should go the extra yard and do your research. Ask them how your data is secured, where it is stored, what sort of encryption they use, whether your data is backed up, and what mitigation procedures they have in place in the case of a security breach. Keep your technology providers honest in the same way your customers do you.

?

Source: http://resources.avg.com.au/business/cloud-computing/

eli manning kelly clarkson national anthem halftime show super bowl halftime show 2012 ahmad bradshaw tom brady halftime super bowl 2012

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.