Federation of Small Businesses warns of continued security fears for SMBs in the cloud

(c)iStock.com/rvlsoft

The Federation of Small Businesses (FSB) has found nearly two fifths of small businesses are sceptical about the benefits of cloud technology when compared against security risks.

The survey, which was conducted in association with Verve and polled over 1200 SMB professionals, found 59% were using cloud services of some description, and of those, the biggest worry was a risk of data being lost, stolen or damaged, cited by 61% of respondents.

55% were worried about not being able to...

By James Bourne, 20 February 2015, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Security.

Healthcare data security: Is cloud encryption alone enough?

By Kenneth N. Rashbaum, Esq. and Liberty McAteer, Esqs.

This blog post is for informational and educational purposes only. Any legal information provided in this post should not be relied upon as legal advice. It is not intended to create, and does not create, an attorney-client relationship and readers should not act upon the information presented without first seeking legal counsel.

What if the data of 80 million Anthem subscribers were encrypted at rest? And...

By Logicworks, 16 February 2015, 1 comment. Categories: Data & Analytics, Data Loss, Data Management, Security, Vulnerabilities.

A matter of trust: The importance of backups in cloud computing

(c)iStock.com/kjekol

Strong security is a foundational element of every public, private and hybrid cloud implementation and will be a top concern for all businesses as part of a macro trend taking grip in 2015. Research shows that 90 percent of the world’s data has been generated in the past two years – calling into question not only data storage, but also data safety.

When it comes to security in the cloud, disaster recovery (DR), backup and...

By Chad Buzzard, 30 January 2015, 0 comments. Categories: Data & Analytics, Data Loss, Disaster Recovery, Security.

Frequency vs. size of cloud data breaches: Which is worse?

(c)iStock.com/sproetniek

Let’s face it, 2014 was a busy year for hacks and data breaches. There were the high profile Sony hacks, the record breaking fines handed out as a result of ePHI (electronic Protected Health Information) healthcare data breaches in the US, and sites such as Gmail and eBay were also targeted by hackers.

The potential for breaches to occur more frequently as businesses collect increasing amounts of consumer data was

By Aleks Szymanski, 28 January 2015, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Security.

What happens when data gets lost from the cloud?

(c)iStock.com/imilian

Let’s be clear: you need to store all that data somewhere. Hard drives were your only resort a few decades ago. Today, cloud is the new frontier on the data storage land, brimming with features.

So you’ve got data stored somewhere on cloud servers – your photos on Facebook, conversations in Skype, and projects in Asana – but what happens if one of these services take a knock and your data gets wiped?

Here’s the kicker: the cloud has many benefits (affordable...

By Dan Virgillito, 26 January 2015, 2 comments. Categories: Data & Analytics, Data Loss, Security.

Five tips to secure your cloud future

(c)iStock.com/maxkabakov

The cloud has been central to the business workings of organisations. Reliance on the cloud as a central storage tool highlights the importance of security. With important data and documents and sensitive information stored away on the cloud, there is too much at stake. Intense effort and investment needs to be put into making sure cloud providers are providing these five main security features:

Standards based integration with identity management providers

Forming an integrated...

By William Rabie, 22 January 2015, 0 comments. Categories: Security, Vulnerabilities.

How cloud providers can prevent data loss: A guide

(c)iStock.com/4774344sean

Feature Cloud service providers find themselves in a struggle balancing responsibility for maintaining data integrity with delivering cost effective solutions to their customers, all the while protecting their own data assets and bottom line.

Generally, the type of service they are delivering limits a provider’s responsibility level. In the case of infrastructure as a service (IaaS) a provider might just be delivering infrastructure and a means of creating cloud environments with no...

By David Auslander, 15 January 2015, 0 comments. Categories: Data & Analytics, Data Loss, Security.

User credentials remain the Achilles heel of cloud apps: How you can prevent an attack

(c)iStock.com/bestdesigns

High-profile security breaches have dominated the headlines in 2014. Two notable examples over the last few months, the Apple iCloud and Dropbox breaches, have revealed a juicy target for attackers: user credentials.

Rather than try to hack into the application itself like iCloud, Dropbox, Salesforce, or Amazon Web Services (AWS), an easier and much more feasible approach to gaining access to sensitive data, celebrity photos, or whatever else an attacker is after, is through stolen...

By Ofer Hendler, 02 January 2015, 3 comments. Categories: Exploits, Security, Vulnerabilities.

KPMG survey shows how cloud “continues to drive disruption in the business world”

(c)iStock.com/mihtiander

Almost half of respondents in KPMG’s 2014 cloud computing survey are using cloud to drive cost efficiencies, with a similar number utilising it to better enable their mobile workforce.

The study, of 500 global C-suite executives, saw a variety of ways in which businesses are using cloud to drive business transformation. Aside from cost savings (49%) and enabling a mobile workforce (42%), CXOs also see the benefit of cloud as improving alignment with customers and partners (37%),...

By James Bourne, 02 January 2015, 1 comment. Categories: Adoption, Compliance, Privacy, Security, Vulnerabilities.

The cryptic cloud: Can cloud encryption operate effectively right now?

©iStock.com/Henrik5000

Encryption in the digital world is akin to a safe in the physical world. Data is locked away and can only be seen by those who have the correct key. Among other things, encryption is what provides an assurance of confidentiality in data security and it is fast gaining ground in the cloud. But is encrypted data therefore more secure? Not if your keys are transferred in the clear, duplicated or mismanaged.

Data that goes to the public cloud is usually transferred securely and files are...

By Pedro Venda, 23 December 2014, 0 comments. Categories: Exploits, Security, Vulnerabilities.

Meet Zenedge, the firm which protects the entire enterprise ecosystem in the cloud

Picture credit: iStockPhoto

Zenedge has announced the general availability of its latest Zenshield DOME platform with a simple goal: to protect your enterprise from what it perceives to be its weakest link.

That weakest link is a firm’s partner and supplier ecosystem, which Zenedge insists is a more likely target for hackers trying to infiltrate an enterprise in the cloud.

The product is a security platform as a service (SPaaS), and can be extended to a retailer’s partner and supplier network so...

By James Bourne, 28 November 2014, 0 comments. Categories: Exploits, Platform, Security, Vulnerabilities.

Look closer to home for the biggest cloud security issue, SME execs told

Picture credit: iStockPhoto

The biggest threat to cloud security among IT is the company’s employees unintentionally exposing data, according to the latest research figures from CloudEntr.

The study, which took 438 survey responses from industries including financial and manufacturing, found three quarters (75%) of smaller businesses are most worried about their workforce when it comes to securing data in the cloud. Larger IT firms were more concerned about hackers using employee credentials to get...

By James Bourne, 27 November 2014, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Security.

Docker vulnerability exposed, users urged to upgrade for cloud security

Picture credit: iStockPhoto

Docker, the Linux container for run-anywhere apps, has a major vulnerability in all but the latest version of its software which can enable malicious code to extract hosted files.

The vuln, described as ‘critical’ in severity, was first spotted by Red Hat’s security researcher Florian Weimer and independent researcher Taunis Tiigi, with Docker crediting them in a security advisory.

“The Docker engine, up to and...

By James Bourne, 27 November 2014, 0 comments. Categories: Security, Vulnerabilities.

Four key ways to overcome security concerns in the cloud

Picture credit: iStockPhoto

Ten days ago I hosted a seminar on cloud security at the Public Sector Enterprise ICT conference in London. In a show of hands at the start of the discussion, the forty or so attendees were unanimous in their agreement that the issue of security is one of the most important considerations in the journey to the cloud.

Joining me on the panel was Tony Richards, the head of security at G-Cloud and Ian Gale from Bristol...

By Ivan Harris, 25 November 2014, 0 comments. Categories: Government, Security, Vulnerabilities.

The top cloud computing threats and vulnerabilities in an enterprise environment

Picture credit: iStockPhoto

Analysis I’ve seen different companies with operational models 90% based on cloud services, where the rest of the 10% is constituted of in-house servers. The basic response after asking about security issues related to cloud services was that the cloud service provider will take care of them and they don’t have to worry about it.

This isn’t necessarily the case with every cloud service provider, since some CSPs have a good security model in place, while others clearly do...

By Dejan Lukan, 21 November 2014, 0 comments. Categories: Security, Vulnerabilities.

Salesforce customers: Learn from Code Spaces’ swift demise

Picture credit: iStockPhoto

A benchmark report by Adallom into the uptake of software as a service (SaaS) applications has found that Salesforce customers have the highest percentage of privileged access users – and warned about the problems that may cause businesses.

On average 7% of users on Salesforce accounts are privileged or have admin access, compared with 4% for Google Apps, 2% for Box and 1% for Office 365, the other three services analysed.

The report gave a grave warning over the prevalence...

By James Bourne, 05 November 2014, 0 comments. Categories: Case Studies, Disaster Recovery, Research, SaaS , Security, Software.

China launches “Great Firewall” attack against iCloud

According to a report by web censorship watchdog Great Fire, China's infamous state firewall is performing a MITM (Man-in-the-Middle) attack against users of Apple's Cloud-based services. It is suspected the attack has been launched in response to Apple's new default encryption methods.

It is possible to circumvent the fake site using a VPN, or one of iCloud's many other IP addresses.

Since iOS 8, authorities can no longer bypass on-device encryption to gain access. The convenient timing of...

By Ryan Daws, 20 October 2014, 0 comments. Categories: Government, Security.