Why it is vital to talk about security with your cloud provider

(c)iStock.com/creative-idea

Cyber security is currently centre stage – no matter where you turn, it is all over the news.

Just this last month we’ve certainly heard a plethora of stories about companies that have been affected by breaches and hacks. A UK telecoms provider experienced a detrimental cyber security attack where customers’ personal data was breached, and in a separate incident...

By Monica Brink, 02 December 2015, 0 comments. Categories: IaaS, Infrastructure, Security.

Why security will make small businesses move to the cloud in 2016

(c)iStock.com/eric1513

It has long been said that security concerns are what drives small businesses away from putting their data in the cloud. Yet according to Oscar Arean, technical operations manager at disaster recovery provider Databarracks, 2016 will see more small to medium firms move towards cloud services as managing security in-house becomes an increasing headache.

In particular, Arean argues the need for small businesses to move to Office 365 – almost by default – because of its...

By James Bourne, 01 December 2015, 3 comments. Categories: Adoption, Security.

Identity management in the cloud: What does it actually mean?

(c)iStock.com/mihau

Identity management in the cloud? What does this actually mean to us? We don’t yet have an established definition of cloud identity management - and there is not even a Wikipedia page yet, although identity management is well founded. That says it all. I’m going to attempt to draw up a definition.

Using cloud applications has now become commonplace for many organisations. Certainly in education, cloud applications have been used for years, such as Office 365 and various...

By Robert Doswell, 17 November 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.

Bringing DRaaS to the C-suite: The key job roles analysed

(c)iStock.com/samxmeg

A series of large scale cyberattacks have been in the headlines this year and, according to McAfee, the situation will only worsen as hackers use more advanced techniques to infiltrate networks.

Despite this, there are still a large portion of companies that remain vulnerable, mainly due to the lack of executive interest in preparing for worst-case scenarios. The same report states that 79 percent of C-level US and...

By Monica Brink, 13 November 2015, 1 comment. Categories: Data & Analytics, Data Loss, Data Management, Disaster Recovery, Security.

It's time to take your big data strategy beyond the data lake

(c)iStock.com/Bastar

A well-established – and unsettling – metric we anecdotally hear from organisations is that analysts spend 70% or more of their time hunting and gathering data and less than 30% of its time deriving insights.

The promise of big data is to reverse this 70/30 ratio. Organisations striving to build a data lake and use data for competitive advantage are seduced by the opportunity to discover new insights to better target customers, improve operations, lower costs, and discover new...

By Dr. Paul Terry, 12 November 2015, 0 comments. Categories: Big Data, Data & Analytics, Privacy, Security.

Data centre security: Do you understand your risk?

(c)iStock.com/baranozdemir

Let’s assume for a moment that you still manage all or some of your data in-house.

By implication that means that somewhere in the building you have a room full of servers that need to be maintained and protected. And as a manager you’ll be aware of the physical risks that threaten the integrity of your data. These include not only flood, fire and incursions by malicious third parties but also the havoc that can be created by unauthorised members of staff entering the...

By John Hall, 22 October 2015, 0 comments. Categories: Data & Analytics, Data Centres, Data Management, Security.

Addressing the hurdles of cloud security: Why you may be setting yourself up for failure

(c)iStock.com/kmlmtz66

Security is trumpeted as a top concern for organisations, especially with increased investment in new technologies like mobile, cloud, and the Internet of Things. As new technologies are introduced and adversaries become more sophisticated, the threat landscape and the attack surface within organisations continues to grow. This means that not only do organisations need protection from threats, they need to protect their data and they also need to protect their reputation and brand....

By Monica Brink, 21 October 2015, 0 comments. Categories: Big Data, Data & Analytics, Security.

Who should look after cloud data – the CSP or the end user? Execs undecided

(c)iStock.com/BlackJack3D

The debate over whether the end user or the cloud service provider (CSP) should be responsible for data security has been reopened after new research from Armor and Ponemon Institute proved inconclusive.

The survey, which quizzed 990 US and UK-based CIOs, CISOs and directors of IT operations, found almost a third (31%) expect their cloud provider to keep SaaS applications secure, while 20% believe the customers are more responsible and only 16% argue it is a shared...

By James Bourne, 16 October 2015, 1 comment. Categories: Security, Vendors.

Managing the risks of cloud collaboration in business today

(c)iStock.com/Alija

Gartner predicts that cloud office systems will account for 33% of the overall office market by 2017. This is a big step considering a few years ago collaboration in businesses typically involved emails, phone calls, and perhaps a few instant messages exchanged within the company.

However, nowadays the arrival of cloud computing and all the remunerations that come with it have shaped the path for collaborative cloud-based services, which is reforming how...

By Nigel Moulton, 16 October 2015, 1 comment. Categories: Collaboration, Security.

Securing your data centre from human error with a multi-step security approach

(c)iStock.com/gogo_b

10 years ago, few could have predicted that the world would generate data on today’s colossal scale, that a new social media environment would emerge, or that the Internet of Things (IoT) would integrate devices with intelligent IT. These changes have impacted the way we access data, and the way that businesses manage and store data.

Recently we have seen an evolution in infrastructure and storage to support these new trends, both for the business community and for consumers, which...

By Sean McAvan, 22 September 2015, 0 comments. Categories: Data & Analytics, Data Centres, Data Loss, Data Management, Infrastructure, Security.

Is your data privacy and security bulletproof?

(c)iStock.com/Nomadsoul1

To ensure a completely bulletproof data service, there are certain components you must own and control. At all times, you need to ensure that you’re in the driver’s seat, and that you didn’t hand over your car keys, along with your corporate data security and privacy, to someone else.

As your company's security expert, you are the one chosen to protect your organisation's data so you should invest in a system that allows you to apply your corporate policies,...

By Saimon Michelson, 11 September 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.

Data sovereignty and the cloud: How do we fully control data amidst the cloud sprawl?

(c)iStock.com/cherezoff

The problem

One of the basic tenets of cloud computing is the ability to provide access to resources across a geographically dispersed cloud environment. This makes the cloud ideal for global distribution of applications and data. But what about those geographies that have highly restrictive data sovereignty laws or practices, such as Germany, Austria and South Korea? What about governmental bodies attempting to protect information while utilising the cloud?

An interesting example is...

By David Auslander, 09 September 2015, 0 comments. Categories: Big Data, Data & Analytics, Data Sovereignty, Privacy, Security.

The dangers of the 1% in cloud environments: Users remain the big security risk

(c)iStock.com/Jirsak

The concept of the 1%, in economic terms, usually refers to wealth inequality; however, a recent report from CloudLock shows that in cloud environments, 75% of the security risk can be attributed to just 1% of users.

This instance, of course, has more in common with the Pareto principle, whereby approximately 80% of the effects come from 20% of the causes, than anything else. Yet the report analyses a trend familiar to the readers of this publication; a key security risk when moving data...

By James Bourne, 26 August 2015, 0 comments. Categories: Applications, Enterprise, Security, Vulnerabilities.

Finance sector looking further to the cloud – but beware security risks

(c)iStock.com/BlackJack3D

More proof arrives that financial organisations are becoming more comfortable with cloud technologies: according to the latest industry outlook from Skyhigh Networks, the average financial services company uses more than 1,000 cloud services, with collaboration tools the most popular type of application used. But is it a good thing?

The report, which focuses on real life data from 3.7 million employees at banks, insurance companies and credit card firms among others, found the...

By James Bourne, 25 August 2015, 1 comment. Categories: Adoption, Enterprise, Security, Software.

Disaster recovery and backup - and all that is between them

(c)iStock.com/-MG-

Everyone should back up important or valuable data, whether that data is family photos for individuals or business documents for companies. Individuals may be happy to buy a local hard drive and put it in the attic but for companies where their business depends on their emails or file records it would make sense to have a more robust solution.

Many companies are now backing up their data with cloud vendors. Besides the relative simplicity of this solution, it makes commercial sense to store...

By Joseph Blass, 13 August 2015, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Disaster Recovery, Security.

Google is moving towards the hosted desktop – but they can go one step further

(Image Credit: iStockPhoto/iStockFinland)

Recently I read a fascinating article by Rachel King in the WSJ CIO Journal titled “Google moves its corporate applications to the Internet”. This article was of particular interest to me because I manage a company that offers a hosted desktop solution to SMEs, and what is described as Google’s “new approach” is the approach that our customers have been...

By Joseph Blass, 11 August 2015, 1 comment. Categories: Enterprise, Google, Security.

New report shows finance sector becoming more comfortable with cloud adoption

(c)iStock.com/borisyankov

Analysing cloud adoption across industry verticals, the banking and financial industry is as good a yardstick as any to assess progress due to its stringent data security requirements. A new report from CipherCloud shows financial firms have an increased confidence in cloud technologies; 100% of respondents said they put certain personally identifiable information (PII) in the cloud.

This does not extend to all PII however – only one in three respondents said they use the cloud...

By James Bourne, 30 July 2015, 0 comments. Categories: Adoption, Compliance, Data Management, Security.

Disaster recovery: Where time matters

(c)iStock.com/ziggymaj

Disasters can strike at any time. They may be caused by human error, cyber-attacks or by natural disasters such as earthquakes, fires, floods and hurricanes. Even so it’s quite tempting to sit back and relax, to not worry about the consequences of these upon one’s business – perhaps for cost reasons, but investments in business continuity are like an insurance policy. It’s not just about disaster recovery because the best way to prevent...

By Graham Jarvis, 20 July 2015, 2 comments. Categories: Data & Analytics, Data Management, Disaster Recovery, Security.

Security and advanced automation in the enterprise: Getting it right

(c)iStock.com/Mikko Lemola

By Phil Christensen, Senior Engineer, DevOps

Complexity is a huge security risk for the enterprise.

While security is always a top priority during the initial build phase of a cloud project, over time security tends to slip. As systems evolve, stacks change, and engineers come and go, it’s very easy to end up with a mash-up of legacy and cloud security policies piled on top of custom code that only a few engineers know how to work with.

The security of your system should not...

By Logicworks, 15 July 2015, 0 comments. Categories: Architecture, Enterprise, Security.

Four in five execs think conventional security is not enough for cloud environments

(c)iStock.com/alengo

Earlier this week, this publication reported on a C-level study which showed a distinct lack of trust in cloud storage for fully securing corporate data. Now, a new survey from CloudPassage sheds light on the security executive perspective; 80% of security execs in North America don’t believe conventional network security...

By James Bourne, 01 July 2015, 0 comments. Categories: Adoption, Research, Security, Vulnerabilities.