{"id":614,"date":"2013-10-11T09:04:01","date_gmt":"2013-10-11T14:04:01","guid":{"rendered":"http:\/\/flevy.com\/blog\/?p=614"},"modified":"2015-11-26T17:53:08","modified_gmt":"2015-11-26T22:53:08","slug":"safety-in-the-cloud-5-best-practices-for-cloud-storage-security","status":"publish","type":"post","link":"https:\/\/flevy.com\/blog\/safety-in-the-cloud-5-best-practices-for-cloud-storage-security\/","title":{"rendered":"Safety in the Cloud: 5 Best Practices for Cloud Storage Security"},"content":{"rendered":"<p><a href=\"https:\/\/flevy.com\/blog\/wp-content\/uploads\/2013\/10\/Depositphotos_31110499_xs.jpg\"><img decoding=\"async\" class=\"alignright size-medium wp-image-615\" src=\"https:\/\/flevy.com\/blog\/wp-content\/uploads\/2013\/10\/Depositphotos_31110499_xs-300x225.jpg\" alt=\"cloud storage concept\" width=\"300\" height=\"225\" srcset=\"https:\/\/flevy.com\/blog\/wp-content\/uploads\/2013\/10\/Depositphotos_31110499_xs-300x225.jpg 300w, https:\/\/flevy.com\/blog\/wp-content\/uploads\/2013\/10\/Depositphotos_31110499_xs.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>As companies migrate to the cloud for broader access to applications and scalable storage at a reasonable price, concerns about security in the cloud are rising. The 2012 SailPoint Market Pulse Survey found that over one-third of U.S. businesses have or plan to have high-risk data stored in the cloud, and more than 95 percent of those surveyed have security concerns about the cloud. While it can certainly be a worthwhile investment, there are several best practices you should follow to make your cloud computing experience safer.<\/p>\n<h2>Top Security Risks<\/h2>\n<p><strong>Hackers and data thieves.<\/strong> While you run this risk when storing data in-house, you also run it in the cloud. If you select a shared cloud, your risk is greater, too\u2014should a hacker breach another business&#8217; security protocol, he could access your sensitive data because it&#8217;s on the same cloud. Security monitoring and data encryption mitigate this risk, but it cannot be eliminated.<\/p>\n<p><strong>Data loss.<\/strong> Simply moving your data to the cloud does not mean it is secure and free from loss. Investigate the cloud provider&#8217;s security and backup practices to ease worries.<\/p>\n<p><strong>Unauthorized access.<\/strong> While most cloud storage systems allow you to define access control, rogue employees or data center workers could gain unauthorized access to your data. Review access control after any cloud update, as privileges may reset accidentally.<\/p>\n<h2>Five Best Practices<\/h2>\n<p><strong>Read the fine print.<\/strong> When selecting a cloud storage provider, read the fine print in the vendor contract. The word &#8220;shall&#8221; indicates that the vendor is obligated to perform that duty, while weaker words like &#8220;try&#8221; are no guarantee.<\/p>\n<p><strong>Perform regular backups.<\/strong> A secure backup is an important part of any cloud strategy. Although infrequent, you could lose data access if the cloud data center has a power outage, or a data thief could raid your cloud. As a best practice, store backups in another location. If that cloud data center is destroyed by fire, you lose access to all your data. If you have a secure backup in-house and another backup elsewhere, you can resume business.<\/p>\n<p><strong>Use strong passwords.<\/strong> Eighty percent of 2011&#8217;s computing security issues stemmed from weak administrative passwords such as password, welcome or 123456, according to the 2012 Trustwave Global Security Report. When an employees use strong passwords, they lessen the chance a hacker will gain system entry.<\/p>\n<p><strong>Stay plugged in.<\/strong> Follow cloud vendors, data storage providers and security experts on social media. If there&#8217;s a sudden security threat, spyware epidemic or other problem, these guys will tweet and post about it. Identity security expert <a href=\"https:\/\/twitter.com\/LifeLock\">@Lifelock<\/a> posts valuable information on Twitter, including tips for security monitoring and insights into threats.<\/p>\n<p><strong>Keep sensitive data secured.<\/strong> Third-party vendors with access to your cloud could cause a data breach if their security policies are poor. Ask your cloud vendor whether third-party vendors will have access to data. For the most sensitive enterprise data such as prototypes, customer financial records or medical records, consider storing the data in-house if you have any doubts about the security policies implemented by the cloud provider.<\/p>\n<div class=\"aside\"><a href=\"https:\/\/flevy.com\/browse\/business-document\/get-your-cloud-strategy-right-286\">Get your <b>Cloud Strategy<\/b> right<\/a> with this comprehensive IT business toolkit (166-slide PDF) <a href=\"https:\/\/flevy.com\/browse\/business-document\/get-your-cloud-strategy-right-286\">found here on Flevy<\/a>. This toolkit was developed by Martin Palmgren, a seasoned IT Strategy Executive. \u00a0He is an international thought leader and visiting professor at some of France&#8217;s top business schools, notably EDHEC where he intervenes on Innovation, Business Model Innovation, Strategy, IT Strategy (Execution), IT Governance, IT Sourcing, Cloud (Sourcing).<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As companies migrate to the cloud for broader access to applications and scalable storage at a reasonable price, concerns about security in the cloud are rising. The 2012 SailPoint Market Pulse Survey found that over one-third of U.S. businesses have or plan to have high-risk data stored in the cloud, and more than 95 percent&hellip;&nbsp;<a href=\"https:\/\/flevy.com\/blog\/safety-in-the-cloud-5-best-practices-for-cloud-storage-security\/\" rel=\"bookmark\"><span class=\"screen-reader-text\">Safety in the Cloud: 5 Best Practices for Cloud Storage Security<\/span><\/a><\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[84],"tags":[267,269,268],"class_list":["post-614","post","type-post","status-publish","format-standard","hentry","category-information-technology","tag-cloud","tag-cloud-safety","tag-cloud-security"],"_links":{"self":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts\/614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/comments?post=614"}],"version-history":[{"count":8,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts\/614\/revisions"}],"predecessor-version":[{"id":2086,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts\/614\/revisions\/2086"}],"wp:attachment":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/media?parent=614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/categories?post=614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/tags?post=614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}