Is Cloud Computing Secure Enough?Posted by Tracy Baker on Mar 8, 2013 in Blog, Virtual Business | 0 comments
Decision-makers within many organisations are contemplating a move into the world of cloud computing, especially as they consider how important it is to outsource their business through reliable virtual assistant networks as part of a push toward internal efficiency. However, they need to balance the pros and cons associated with making all of these changes and they should be trying to educate themselves as they determine the real benefits associated with cloud computing, versus any potential issues. There should always be reflection when it comes to making significant changes in the business environment, especially when it comes to reliability and security, as anything that might happen to affect those parameters could have far-reaching consequences within the organisation.
Security is probably the key area under consideration and it is the area that’s most mentioned by corporate decision-makers as they discuss and analyse whether they are going to make a wholesale move into the cloud. Once data has been transferred effectively beyond the organisation’s boundaries and into the cloud they want to know just how safe it is. For example, can information be accessed and compromised? Could it be manipulated to provide intelligence for competitors? If it is stored, physically, in a country or within a jurisdiction that may be seen as potentially hostile, what could happen if the jurisdiction suddenly passed new laws that allowed legislators to gain access to the data?
It goes without saying that access to any person or body, whether they were friendly or hostile, or involved with any government or legal position whatsoever must be restricted. When information is stored within a system that is not directly underneath the control of the senior management of the business, security architecture must be first-class.
We must always remember that information that is stored in the cloud is encrypted according to the highest standards available in the industry. The algorithms that enable the data to be encrypted in the first place are also kept completely separate from any keys that would enable access to the data. Thus, there are several different boundaries and hurdles to pass before the actual information that’s stored can be read by anyone who is unauthorised.
Whilst we are always concerned with security, we must also be worried if we’re not able to access our information as and when needed without fail. This is why it’s important to analyse the ratio of uptime for individual providers and decide just how important near 100% availability is to us. It’s also important to look at the standards published by the provider of service to see what happens in the event of a failure, however remote that may be. Are there facilities in place to migrate data from a failed server to an available server simultaneously in the event of any problem?
A lot has changed in the world of cloud computing in the space of a few years. The industry has developed a solid reputation and is keeping pace with the enormous increase in demand as people change over to a new life “in the cloud.”
How do you feel about the security of Cloud Computing?