flevyblog

Flevy Blog is an online business magazine covering Business Strategies, Business Theories, & Business Stories.
MANAGEMENT & LEADERSHIP STRATEGY, MARKETING, SALES OPERATIONS & SUPPLY CHAIN ORGANIZATION & CHANGE IT/MIS Other

Safety in the Cloud: 5 Best Practices for Cloud Storage Security

cloud storage conceptAs companies migrate to the cloud for broader access to applications and scalable storage at a reasonable price, concerns about security in the cloud are rising. The 2012 SailPoint Market Pulse Survey found that over one-third of U.S. businesses have or plan to have high-risk data stored in the cloud, and more than 95 percent of those surveyed have security concerns about the cloud. While it can certainly be a worthwhile investment, there are several best practices you should follow to make your cloud computing experience safer.

Top Security Risks

Hackers and data thieves. While you run this risk when storing data in-house, you also run it in the cloud. If you select a shared cloud, your risk is greater, too—should a hacker breach another business’ security protocol, he could access your sensitive data because it’s on the same cloud. Security monitoring and data encryption mitigate this risk, but it cannot be eliminated.

Data loss. Simply moving your data to the cloud does not mean it is secure and free from loss. Investigate the cloud provider’s security and backup practices to ease worries.

Unauthorized access. While most cloud storage systems allow you to define access control, rogue employees or data center workers could gain unauthorized access to your data. Review access control after any cloud update, as privileges may reset accidentally.

Five Best Practices

Read the fine print. When selecting a cloud storage provider, read the fine print in the vendor contract. The word “shall” indicates that the vendor is obligated to perform that duty, while weaker words like “try” are no guarantee.

Perform regular backups. A secure backup is an important part of any cloud strategy. Although infrequent, you could lose data access if the cloud data center has a power outage, or a data thief could raid your cloud. As a best practice, store backups in another location. If that cloud data center is destroyed by fire, you lose access to all your data. If you have a secure backup in-house and another backup elsewhere, you can resume business.

Use strong passwords. Eighty percent of 2011′s computing security issues stemmed from weak administrative passwords such as password, welcome or 123456, according to the 2012 Trustwave Global Security Report. When an employees use strong passwords, they lessen the chance a hacker will gain system entry.

Stay plugged in. Follow cloud vendors, data storage providers and security experts on social media. If there’s a sudden security threat, spyware epidemic or other problem, these guys will tweet and post about it. Identity security expert @Lifelock posts valuable information on Twitter, including tips for security monitoring and insights into threats.

Keep sensitive data secured. Third-party vendors with access to your cloud could cause a data breach if their security policies are poor. Ask your cloud vendor whether third-party vendors will have access to data. For the most sensitive enterprise data such as prototypes, customer financial records or medical records, consider storing the data in-house if you have any doubts about the security policies implemented by the cloud provider.

Get your Cloud Strategy right with this comprehensive IT business toolkit (166-slide PDF) found here on Flevy. This toolkit was developed by Martin Palmgren, a seasoned IT Strategy Executive.  He is an international thought leader and visiting professor at some of France’s top business schools, notably EDHEC where he intervenes on Innovation, Business Model Innovation, Strategy, IT Strategy (Execution), IT Governance, IT Sourcing, Cloud (Sourcing).

About Shane Avron

Shane Avron is a freelance writer, specializing in business, general management, enterprise software, and digital technologies. In addition to Flevy, Shane's articles have appeared in Huffington Post, Forbes Magazine, among other business journals.

, ,




  • Sajesh

    Shane, that’s an interesting read. Here is a blog post complimenting your article with 7 Key Security Consideration For Business File Sharing. http://bit.ly/1jHcE3l

Complimentary Business Training Guides


Many companies develop robust strategies, but struggle with operationalizing their strategies into implementable steps. This presentation from flevy introduces 12 powerful business frameworks spanning both Strategy Development and Strategy Execution. [Learn more]   What does it take to achieve Operational Excellence? Read this guide and learn to build an integrated Business Execution System from Six Sigma Master Black Belt Frank Adler, co-founder of Operational Excellence Consulting. [Learn more]
The Fiaccabrino Selection Process (FSP) is a proven methodology for increasing sales and reducing turnover, developed by "Mr. Roche," Charles Fiaccabrino. Mr. Fiaccabrino is a Sales Executive with over 50 years of experience. [Learn more]   Learn this time-tested approach to Change Management authored by Ron Leeman, recipient of the Change Leader award by the World HRD Congress in 2012. Ron Leeman has been Change, Process and Project professional since 1974. [Learn more]
Recent Articles by Corporate Function

  

  

  

  

  


The Flevy Business Blog (http://flevy.com/blog) is a leading source of information on business strategies, business theories, and business stories. Most articles have been contributed for management consultants and industry executives with over 20 years of experience. If you would like to contribute an article, please email our editor David Tang at [email protected].

Flevy (http://flevy.com) is the marketplace for premium business documents, such as management frameworks, presentation templates, and financial models. Our documents are of the same caliber produced by top tier consulting firms, like McKinsey, Bain, Accenture, BCG, and Deloitte. Learn more about Flevy here.


Connect with Flevy:

   
  


About Flevy.com   /   Terms   /   Privacy Policy
© 2015. Flevy LLC. All Rights Reserved.