Cloud Computing: essential to SMEs?

It has been reported this week that 65% of US small to medium sized businesses (SMEs) say that cloud computing is absolutely essential to their organisation and future growth plans. Meanwhile 59% have stated that their selection of

By VI, 24 July 2012, 0 comments. Categories: Enterprise, Security.

What are the 7 challenges facing federal cloud computing?

The United States Government Accountability Office (GAO) has found that, while the US ‘Cloud First’ enterprise project is making tangible progress, there are seven cloud lessons for the public sector.

The report, subtitled “progress made but future cloud computing efforts should be better planned”, charts the progress of Cloud First – a federal policy which exhorts agencies to find a cloud-based IT solution whenever logistically possible.

Things appear to have moved forward since...

By James Bourne, 16 July 2012, 0 comments. Categories: Enterprise, Infrastructure, Research, Security.

Establish secure remote access with limited staff and budgets

With some of the recent breaches of restaurant chains, I’ve got to think that many of them were related to poor remote access practices. I say this because in all of my years of consulting, I have found that very weak controls around the remote access is a lot more common than one would think.

Even today you will commonly find things like POS Servers directly accessible on the Internet via VNC, RDP, or pcAnywhere. I have even seen SQL databases that contain credit card data made directly accessible over...

By GreenPages Technology Solutions, 13 July 2012, 0 comments. Categories: Security.

Cisco's backtrack on Connect Cloud - taking privacy for granted?

Cisco has been forced to apologise for what Home Networking Vice President Brett Wingo described as “confusion and inconvenience” following the rolling out of their Connect Cloud system.

The issue concerns a cloud-based update Cisco made to their Linksys EA2700, EA3500 and EA4500 firmware which had originally been rolled out automatically to users’ routers.

The update took many users by surprise, and they weren’t best pleased...

By James Bourne, 09 July 2012, 0 comments. Categories: Adoption, Security.

Storms take Amazon cloud down – were you affected?

In the week that the International Working Group on Cloud Computing Resiliency reported worldwide cloud outages cost at least £45m over five years, the all-encompassing Amazon EC2 Cloud was down on Friday night due to heavy storms in Virginia.

From approximately 2300 EST on Friday users were unable to access various sites utilising the Amazon infrastructure cloud, including

By James Bourne, 02 July 2012, 0 comments. Categories: Consumer, Industry, Security.

Will CliQr end fears of cloud vendor lock-in?

As the Google I/O conference gets underway in San Francisco, a Google-backed start-up has launched a cloud solution which aims to eradicate vendor lock-in.

Cloud management providers CliQr Technologies has launched CloudCenter, a product which “enables applications to get to and fluidly move between clouds with optimal price-performance and without migration disruption and expense”.

The product will have an official unveiling at the...

By James Bourne, 27 June 2012, 0 comments. Categories: OpenSource, Security, Vendors.

Where to allocate resources in the cybercrime war

The cost of protecting ourselves against cybercrime can far outweigh the cost of the threat itself, according to a new study led by computer scientists at The University of Cambridge.

At the behest of the UK Ministry of Defence, the research team compiled the first estimate of direct, indirect and defence costs of different types of cybercrime.

The report’s authors, which included experts from Cambridge University, working with colleagues in Germany, the Netherlands, the USA and UK, concluded that...

By Matt Henkes, 18 June 2012, 0 comments. Categories: Compliance, Industry, Regulation, Security.

Cloud-based solutions best defence against cyber “DDoS” attacks?

A recent paper on distributed denial of services (DDoS) attacks by Neustar concludes that only cloud-based DDoS solutions offer a comprehensive defence against increasing attacks that are expected to surge by as much as 40% in 2012.

“Cloud solutions provide the bandwidth (as measured in Gbps) to absorb today’s massive network layer attacks, plus the technology diversity and processing power to handle application-layer and high packets-per-second strikes,” said Neustar.

Neustar...

By VI, 12 June 2012, 0 comments. Categories: Hacking, Hardware, Security.

2012: the year of the cloud

2012. This is the year of the cloud. This is the year that business is realising it needs the cloud. But why?

Efficiencies is the answer.

If surviving the GFC taught us one thing, it’s how to be lean. If business, and especially small business is to survive and even thrive post-GFC, it must learn to operate on a strict diet.

To be lean and mean. This means not just micro-managing your...

By Nathan Elcoate, 23 May 2012, 0 comments. Categories: Economy, Public, Security.

The cloud security question: Benefit or barrier?

Despite perceptions to the contrary, small to medium sized businesses (SMBs) are benefiting from increased IT data security as a result of a move to cloud computing, according to new research from comscore and Microsoft.

The results of the research, carried out among SMBs in Hong Kong, India, Malaysia, Singapore and the US, oppose the perception of security as the Achilles heel of the cloud argument.

The study shows that 35% of U.S. companies surveyed had experienced noticeably higher levels of security since...

By Matt Henkes, 15 May 2012, 1 comment. Categories: Adoption, Best Practice, Security.

Cloud Backup Or Sync?

Whether your data is stored in the cloud, on your desktop or on your server, you should be backing it up at least daily.

There are a myriad of backup options available on the desktop, from Windows NT Backup to Symantec and other more advanced options.

Some are mirror image backups, some are file by file. As well as backing up we should also be testing our restore processes to make sure our...

By Nathan Elcoate, 14 May 2012, 1 comment. Categories: Best Practice, Consumer, Security.

Data breach costs fall despite increased security challenges

The average cost of a serious IT security breach has fallen over the past two years, despite an increase in their frequency and severity, a new report has claimed.

For the first time in seven years the average cost of a breach has decreased, from $7.2m in 2010 to $5.5m last year. Also, the cost per compromised record fell by 10% to $194, the lowest since 2007.

The Ponemon Institute’s research, carried out on behalf of security specialist Symantec, also revealed that negligent employees are still the...

By Matt Henkes, 21 March 2012, 0 comments. Categories: Research, Security.

Apple devices seeping into Corporate IT networks

Apple has quietly been releasing information on now to integrate its growing list of Smart devices with Enterprise IT.

While currently synonymous with consumers or perhaps less kindly termed "masses", the evidence is clear that Macs, iPads and iPhones are infiltrating corporate environments either knowingly or unknowingly.

The recent emergence of Apple’s iCloud via the Lion OS upgrades also allows consumers to synch their personal data including apps, music, videos and e-books to Apple's remote Datacentres.   ...

By VI, 13 March 2012, 0 comments. Categories: Applications, Enterprise, Industry, Security.

How consumerisation is driving cloud acceptance

There has been a thunderstorm of growing noise surrounding Cloud Computing in the past 24 months. Vendors, analysts, journalists and membership groups have all rushed to cover the Cloud medium - although everyone seems to have their own opinion and differing definition of cloud computing. According to the most common definition, it is Internet-based computing where shared resources, software and information are supplied to users on demand, rather like a utility company would supply electricity, water or...

By Ian Moyse, 13 March 2012, 0 comments. Categories: Adoption, Applications, Consumer, Security.

Cloudy with a Chance of More Venture

Trust makes the world go round.  Without trust, little is possible. Harry Potter author J.K. Rowling wrote, “Never trust anything that can think for itself if you can’t see where it keeps its brain.” 

Quite fitting when you talk about trusting data that resides in the all-invisible cloud. The age-old argument for whether to self-host or outsource always boiled down to trust.

Cloud data is like the tree in the forest: when someone tampers with it,...

By Victor Cruz, 07 March 2012, 0 comments. Categories: Security, Vendors.