• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Security concerns ‘clouding’ benefits of cloud computing

July 11, 2014 by Secure360 and UMSA

Cloud Computing Puzzle Shows Online Services And Business SolutionsIf there’s one thing we keep learning from history it’s no system or device is impenetrable. The Greeks successfully used the “Trojan Horse” and infiltrated the city of Troy, which ended the 10-year war. This is why a Trojan virus is aptly named. It disguises itself as a trusted source, so a user is more likely to invite the program on their device, ultimately installing malware.

In theory, as technology advances, not only does our security but also our vulnerability. Cloud computing is no exception to Murphy’s Law. On one hand, it’s the next best thing in computing, eliminating the use for clunky, unsecure devices and duplicative, outdated data. On the other hand, it’s not widely adopted because the security threats and risks are still murky. However, a vast majority of the security concerns are ‘clouding’ the positive benefits of cloud computing.

Security concern: data breaches

Yes. In some way, shape or form, your company will experience a data breach. But, it won’t always come in the form of a hacker. Data breaches can happen at any time and they aren’t limited to cloud computing. Natural disasters can cause a multitude of problems, and if you are solely relying on physical hardware, your sensitive data could be lost. Additionally, overexposing login and password information to secure networks and devices also increases the risk of a data breach.

Cloud computing automatically saves your data and syncs with all of your devices so documents and information are current. In addition, cloud computing offers data encryption and two-step verification, which further protects your data from an attack.

Security concern: Private vs. Public clouds

Another apprehension towards cloud computing is whether or not to create public or private clouds. Arguably, private clouds offer the most security as they are housed and maintained on a company’s own network. However, it can also be the more costly and time consuming option, requiring more IT and Network Security personnel, equipment, space, and software. Public clouds are typically offered over the Internet, but information is stored in a third party data center, limiting a company’s control over security.

There are services such as hybrid clouds, which allow a company to choose which components stay on their private cloud (typically the most sensitive data information) and what can be directed to a public cloud. This way, it allows employees to access information globally, but removes the risk of compromising sensitive, proprietary information.

Security concern: support, maintenance and upgrades

As more companies move to a cloud computing system, the fear is they will be on their own when it comes to managing support, maintenance and upgrades. However, as part of the subscription or service, most providers automatically include customer support in their packages. Additionally, since cloud computing packages are subscription based, the cost to implement upgrades is nominal compared to installing costly, lengthy and painstaking software.

While the security concerns for cloud computing may still be murky for some, the benefits outweigh the risks. Recognizing that no system or hardware is impervious to attack will actually make your security measures stronger. Determining whether or not to create a private or hybrid cloud will help increase control over cloud computing security. Or, by selecting a public cloud vendor, support, maintenance and upgrades will be provided as part of your subscription.

 

How have you combated security concerns with cloud computing?

Filed Under: Cybersecurity

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

No tweets found.

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.