Securing your data centre from human error with a multi-step security approach

(c)iStock.com/gogo_b

10 years ago, few could have predicted that the world would generate data on today’s colossal scale, that a new social media environment would emerge, or that the Internet of Things (IoT) would integrate devices with intelligent IT. These changes have impacted the way we access data, and the way that businesses manage and store data.

Recently we have seen an evolution in infrastructure and storage to support these new trends, both for the business community and for consumers, which...

By Sean McAvan, 22 September 2015, 0 comments. Categories: Data & Analytics, Data Centres, Data Loss, Data Management, Infrastructure, Security.

Is your data privacy and security bulletproof?

(c)iStock.com/Nomadsoul1

To ensure a completely bulletproof data service, there are certain components you must own and control. At all times, you need to ensure that you’re in the driver’s seat, and that you didn’t hand over your car keys, along with your corporate data security and privacy, to someone else.

As your company's security expert, you are the one chosen to protect your organisation's data so you should invest in a system that allows you to apply your corporate policies,...

By Saimon Michelson, 11 September 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.

Data sovereignty and the cloud: How do we fully control data amidst the cloud sprawl?

(c)iStock.com/cherezoff

The problem

One of the basic tenets of cloud computing is the ability to provide access to resources across a geographically dispersed cloud environment. This makes the cloud ideal for global distribution of applications and data. But what about those geographies that have highly restrictive data sovereignty laws or practices, such as Germany, Austria and South Korea? What about governmental bodies attempting to protect information while utilising the cloud?

An interesting example is...

By David Auslander, 09 September 2015, 0 comments. Categories: Big Data, Data & Analytics, Data Sovereignty, Privacy, Security.

The dangers of the 1% in cloud environments: Users remain the big security risk

(c)iStock.com/Jirsak

The concept of the 1%, in economic terms, usually refers to wealth inequality; however, a recent report from CloudLock shows that in cloud environments, 75% of the security risk can be attributed to just 1% of users.

This instance, of course, has more in common with the Pareto principle, whereby approximately 80% of the effects come from 20% of the causes, than anything else. Yet the report analyses a trend familiar to the readers of this publication; a key security risk when moving data...

By James Bourne, 26 August 2015, 0 comments. Categories: Applications, Enterprise, Security, Vulnerabilities.

Finance sector looking further to the cloud – but beware security risks

(c)iStock.com/BlackJack3D

More proof arrives that financial organisations are becoming more comfortable with cloud technologies: according to the latest industry outlook from Skyhigh Networks, the average financial services company uses more than 1,000 cloud services, with collaboration tools the most popular type of application used. But is it a good thing?

The report, which focuses on real life data from 3.7 million employees at banks, insurance companies and credit card firms among others, found the...

By James Bourne, 25 August 2015, 1 comment. Categories: Adoption, Enterprise, Security, Software.

Disaster recovery and backup - and all that is between them

(c)iStock.com/-MG-

Everyone should back up important or valuable data, whether that data is family photos for individuals or business documents for companies. Individuals may be happy to buy a local hard drive and put it in the attic but for companies where their business depends on their emails or file records it would make sense to have a more robust solution.

Many companies are now backing up their data with cloud vendors. Besides the relative simplicity of this solution, it makes commercial sense to store...

By Joseph Blass, 13 August 2015, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Disaster Recovery, Security.

Google is moving towards the hosted desktop – but they can go one step further

(Image Credit: iStockPhoto/iStockFinland)

Recently I read a fascinating article by Rachel King in the WSJ CIO Journal titled “Google moves its corporate applications to the Internet”. This article was of particular interest to me because I manage a company that offers a hosted desktop solution to SMEs, and what is described as Google’s “new approach” is the approach that our customers have been...

By Joseph Blass, 11 August 2015, 1 comment. Categories: Enterprise, Google, Security.

New report shows finance sector becoming more comfortable with cloud adoption

(c)iStock.com/borisyankov

Analysing cloud adoption across industry verticals, the banking and financial industry is as good a yardstick as any to assess progress due to its stringent data security requirements. A new report from CipherCloud shows financial firms have an increased confidence in cloud technologies; 100% of respondents said they put certain personally identifiable information (PII) in the cloud.

This does not extend to all PII however – only one in three respondents said they use the cloud...

By James Bourne, 30 July 2015, 0 comments. Categories: Adoption, Compliance, Data Management, Security.

Disaster recovery: Where time matters

(c)iStock.com/ziggymaj

Disasters can strike at any time. They may be caused by human error, cyber-attacks or by natural disasters such as earthquakes, fires, floods and hurricanes. Even so it’s quite tempting to sit back and relax, to not worry about the consequences of these upon one’s business – perhaps for cost reasons, but investments in business continuity are like an insurance policy. It’s not just about disaster recovery because the best way to prevent...

By Graham Jarvis, 20 July 2015, 2 comments. Categories: Data & Analytics, Data Management, Disaster Recovery, Security.

Security and advanced automation in the enterprise: Getting it right

(c)iStock.com/Mikko Lemola

By Phil Christensen, Senior Engineer, DevOps

Complexity is a huge security risk for the enterprise.

While security is always a top priority during the initial build phase of a cloud project, over time security tends to slip. As systems evolve, stacks change, and engineers come and go, it’s very easy to end up with a mash-up of legacy and cloud security policies piled on top of custom code that only a few engineers know how to work with.

The security of your system should not...

By Logicworks, 15 July 2015, 0 comments. Categories: Architecture, Enterprise, Security.

Four in five execs think conventional security is not enough for cloud environments

(c)iStock.com/alengo

Earlier this week, this publication reported on a C-level study which showed a distinct lack of trust in cloud storage for fully securing corporate data. Now, a new survey from CloudPassage sheds light on the security executive perspective; 80% of security execs in North America don’t believe conventional network security...

By James Bourne, 01 July 2015, 0 comments. Categories: Adoption, Research, Security, Vulnerabilities.

The CXO view: We’re still unconvinced on cloud storage security

(c)iStock.com/4774344sean

Less than one in three delegates polled at the Infosec 2015 event in London believe the cloud is a safe storage solution for corporate data.

The survey from digital encryption and USB specialist iStorage, which questioned more than 270 respondents including heads of IT, CIOs and CTOs, saw almost half (48%) say they do use cloud technology to store confidential information. 54% of those polled say they still use USB devices to store information.

Over three quarters (78%) said they were currently...

By James Bourne, 29 June 2015, 2 comments. Categories: CIO, Security, Software, Storage.

Dropbox announces user base exceeds 400 million, with eight million business users

Picture credit: Flickr

Dropbox has announced its number of users has exceeded 400 million, with more than eight million business customers also on board.

The figures, disclosed on the occasion of the cloud storage provider’s eighth birthday, also reveal an impressive growth in the UK market, opened up six months ago. The company has grown from three to 10 offices over the past year.

According to the figures, 4,000 edits to documents are made each second on Dropbox, with users syncing 1.2 billion files...

By James Bourne, 26 June 2015, 0 comments. Categories: Enterprise, SaaS , Security, Software, Storage.

Enterprise recognises need to move from public storage to private cloud

(c)iStock.com/nadla

Employees at more than half (55%) of organisations use public file, sync and share (FSS) services. Yet almost three quarters (73%) said they were looking for or had implemented an alternative, according to a new report from CTERA.

More than half (59%) of that number said they favoured a private cloud FSS solution run either on hosted infrastructure or in their own data centre.

35% of organisations have experienced corporate data leakage in 2014 as a result of employees sharing files via...

By James Bourne, 02 June 2015, 0 comments. Categories: SaaS , Security, Software, Storage.

Is your cloud provider HIPAA compliant? An 11 point checklist

(c)iStock.com/AndreyPopov

Healthcare organisations frequently turn to managed service providers (MSPs) to deploy and manage private, hybrid or public cloud solutions. MSPs play a crucial role in ensuring that healthcare organisations maintain secure and HIPAA compliant infrastructure.

Although most MSPs offer the same basic services – cloud design, migration, and maintenance – the MSP’s security expertise and their ability to build compliant solutions on...

By Logicworks, 29 May 2015, 1 comment. Categories: Compliance, Security.

IT managers unconvinced on getting ROI from cloud adoption

(c)iStock.com/malerapaso

More than half of IT managers surveyed by West IP Communications say they expect to get full return on investment by moving to the cloud – but it’s an unconvincing figure.

54% of the more than 300 respondents said they would be able to fully recoup their costs of cloud computing adoption, which of course means 46% aren’t so sure. Yet those with bigger IT budgets were more confident: two thirds (66%) of managers with company IT budgets over $5m were...

By James Bourne, 26 May 2015, 1 comment. Categories: Adoption, Security, Vulnerabilities.

Dropbox becomes latest cloud provider to adopt emerging ISO 27018 standard

(c)iStock.com/KIVILCIM PINAR

Cloud storage provider Dropbox has announced it has achieved certification with the emerging privacy standard ISO/IEC 27018, boosting its security credentials.

ISO 27018 was published on July 30 2014 by the International Organisation for Standardisation (ISO) as a follow up to the widely accepted ISO 27001 information security standard. It aims to put together a code of practice for protection of personally identifiable information (PII) in public clouds. The standard has already been...

By James Bourne, 18 May 2015, 4 comments. Categories: Security, Software, Storage.

Google Drive, Facebook and Twitter most popular business cloud apps – but are they safe?

(c)iStock.com/shutter_m

More than 15% of European organisations now use more than 1000 cloud apps with Google Drive, Facebook and Twitter the most popular, according to a report from Netskope.

The findings, which appear in the April 2015 Netskope Cloud Report, saw iCloud and Salesforce make the top five. Five cloud storage apps (Google Drive, iCloud, OneDrive for Business, OneDrive and Dropbox) made the top 12, alongside four social apps (Facebook, Twitter, Google+, LinkedIn).

Of the organisations analysed in...

By James Bourne, 15 April 2015, 1 comment. Categories: Applications, Data & Analytics, Data Loss, Data Management, Security, Software.

Security failing to keep pace with cloud technology adoption, report finds

(c)iStock.com/Melpopenem

Cloud service providers (CSPs) can no longer treat security as a luxurious add-on, and customers have to ensure their providers take care of the issue, a new report asserts.

The research, the latest cab off the rank from Ovum and FireHost entitled “The Role of Security in Cloud Adoption within the Enterprise”, offers sound advice to vendors and users alike. True, it’s stuff everyone will have heard before – but it’s worth repeating.

“On too many...

By James Bourne, 09 April 2015, 0 comments. Categories: Compliance, Research, Security, Vendors.

Majority of firms say they aren’t confident in responding to cloud-based data threats

(c)iStock.com/Imilian

If data stored in the cloud is under threat, what would you do: fight the fire or hide under the bed and hope everything goes away? The majority of respondents in a recent survey admitted they would do the latter.

The research, commissioned by Informatica and conducted by the Ponemon Institute, found 60% of global respondents were “not confident” they had the ability to proactively respond to cloud-based data threats. 80% said not knowing if sensitive or confidential...

By James Bourne, 08 April 2015, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Security, Vulnerabilities.