Language Preference

Thursday, July 25, 2013

Cloud Computing Threats and Solutions

While cloud computing has been beneficial to expand businesses and increase productivity, security issues remain a threat. When cloud computing is used to store crucial data for organizations, the information is stored in a data center, a central location where IT professionals secure the data with encryption policies and the security of the data in a business is in the hands of the supervisors of that data center. Cloud computing heightens the speed of research and access to information that allow businesses to survive. In addition, that speed allows information to be reliably accessed and secured over the internet, so it can be seen regardless of which information system is in use. The security concerns of the information in the cloud are on the rise. For example, personal data and crucial business information can be exposed and even stolen. First of all, the information is in a central location of a data center, a location that can attract various hackers and potential theft [1]. Also, the increased reliance on cloud computing increases the vulnerability to problems when network outages occur, such as the recent outage in hurricane Sandy [2]. For instance, if patient health records need to be accessed and is stored at the cloud, his/her life can be at risk if such an outage occurs [2]. Statistically, only thirty-eight percent of businesses have adequate protection in place over their information on the cloud [3]. While these risks of cloud computing can be scary, proper precautions can increase the safety of this activity and companies can continue to enjoy the benefits of it while securing their private data. To protect sensitive data, companies need to know exactly who has access to it and ensure that the only people with that access are users of their company. Encryption is necessary so that all information becomes gibberish to any unauthorized users who attempt to read it as soon as the information leaves that organization [4]. Even if the information is stored in a third-party data center, the access of that data must involve the owner of the organization [4]. Also, the data should be protected according to its level of sensitivity, as the costs can add up. Still, these regulations must be enforced as the outcome of leakage of any information in a business can easily exceed the costs of preventing them at great lengths. Despite all of the concerns for the security in cloud computing, such as unauthorized access, excessive reliance during network outages, and information exposure, the benefits of increased productivity and increase of security regarding the IT advances have limitless advantages. [1]http://blogs.cisco.com/smallbusiness/the-top-5-security-risks-of-cloud-computing/ [2]http://healthitsecurity.com/2013/07/25/does-cloud-computing-threaten-patient-privacy-data-security/ [3]http://cloudcomputing.sys-con.com/node/2747305 [4]http://www.siliconrepublic.com/reports/partner/26-ibm/report/390-predictive-threat-and-risk/

No comments:

Post a Comment