29 Jul 2011

 


When it comes to adopting cloud-based solutions, the paramount obstacle many providers are facing is the customer’s concern for security. Many customers are wary of provider’s security policies, procedures, and infrastructure (or lack thereof) set in place to sufficiently protect data and counter security incidents – and rightfully so.

While it’s true that just like any other solution, cloud-based environments have a number of vulnerable points and security issues (hey, perfect security is a practical impossibility), a business’s actual security risk is an issue of targeting the path of least resistance. Unfortunately, that is often the end-user in cloud computing situations. But don’t fret, if your business is heading toward employing a cloud-based solution there are steps you can take as an end-user to better secure your business’s important and sensitive information.

Cost efficiency and scalability aside, one of the most beautiful aspects of cloud-based solutions is that they allow you to access your company’s information and software – anytime, anywhere. As it turns out, this can also be the cause of a company’s information being compromised. Here’s why:

Access to the cloud is granted via endpoints, such as a desktop or laptop computer. With the introduction of smartphones and tablet computers and all of their amazing capabilities, thieves have now added two more targets to their list of favorites. Unfortunately, users often cache their usernames, passwords and credentials for easier access; but if their smartphone, laptop, or tablet is stolen, the thief will then have access as well. Moreover, the amount of malware targeted at smartphones seems to be ever-increasing as a growing number of users store more and more sensitive information on them.

A chain is only as strong as its weakest link – the same goes for a business with ubiquitous end-points, where a main security risk could literally be resting in their own palms. Any and all security measures are rendered worthless by a compromised endpoint if a hacker can successfully seize an end user’s credentials.

Subsequent to selecting a reliable cloud-based solution provider that has both experience and proven security measures in place, every end-user should have an improved understanding in regards to potential risks and the level of security needed to successfully employ a secure cloud service. Remember this: plan for the worst and hope for the best. That way, should anything arise you will have already put the proper steps in place in order to come out on top!

Stephanie Egan

My name is Stephanie Egan. And I am a Support Manager, Work as customer support for Fastblue Communications. Fastblue delivers unique Wholesale FastEthernet, CDN, and DDoS/Security to our customers through our dedicated network of Partners.
I like to bead bracelets in my spare time for fun. Now living in Houston, TX.

Google+