Cloud security Business information who is to protect?
Source: Internet
Author: User
KeywordsCloud security Cloud security
Questions about whether cloud security is safe data thieves, hackers, criminals, they lurk on the web and try to get into your corporate web site, so they can easily steal sensitive business data if the safeguards are not perfect. These actions are shocking. So how can many enterprises safely and effectively use the cloud, how to protect data and infrastructure to avoid the invasion of criminals? Is it safe to use cloud computing? These are not simple questions, says Ara Trembly, head of the Tech consultant, an IT consultant. First, we need to carefully review our business processes and objectively assess the importance and value of the entire organization process, security issues, business data, Trembly said. "It's unwise for some companies to use the cloud," says Trembly, a company that "sees data as life" and doesn't put it in vulnerable places. "Insurance companies, financial institutions and medical centers belong to such businesses. "The problem is that if such companies cannot place these critical data within an organization with the highest protection that maximizes risk reduction, they cannot guarantee that security will fully meet their needs." "The problem of violating HIPPA is very easy to happen. This is not to say that similar problems have arisen, but rather that similar problems may arise. "Cloud security-the challenge of network security, whether public or private, will never be able to use the cloud as required by a supercritical data security enterprise." Or is this kind of security-related challenge making this impossible? At the moment, I'm not sure, "Trembly said. "The problem of cloud and network application is actually bad network security problem." I'm not expecting any significant improvement. The reason network security is so poor is that information is sold, so if someone steals the data, they can sell it. Some may say that these problems will be solved in the end, but I don't think so. "This is a real challenge to data security, Trembly says, because criminals are always on guard, and security personnel, who regularly block intrusions and hacker attacks, tend to lag behind. "They (hackers) stare at Social security account information and any content that exposes the privacy of others. The information collected from industrial espionage is available for sale. "That's the motive of the outlaws, and the benefits will drive them to be a step ahead forever," Trembly says. "They are willing to devote all their energy and precious time to all the attempts that you want to prevent." There are a lot of funded illegal enterprises. Just as we make a living by handling and protecting information, they make a living by stealing information. "Because of these motivations and their inherent dangers, it is not safe for customers with insurance and financial services to put information on the cloud," he said. Whether you're using a public cloud or a private cloud, there are problems with cloud security, Trembly said. In contrast, security issues are less severe in internal systems with intrusion prevention measures. "But if it must be based on theDo not use the cloud if you are willing to achieve security. "If some of the key data class businesses have to use the cloud to implement certain it functions, then it is perfectly acceptable to have some basic functionality such as housing maintenance and supply ordering," he said. "These features are not related to critical data." "If you have a better way, you don't have to stick to it," trembly adds. Cloud has many advantages, one of the outstanding benefits is that it can save costs, Trembly said. If business data is compromised, cost savings are less important. Because it will not only bring great trouble to the enterprise, but also will dampen the enthusiasm of enterprise users, damage the company's reputation. "Once public, things will be around the restoration of trust, to regain customer recognition, and if we do not have the trust of everyone, the customer would be far away." "What should your business do when faced with a choice?" How to make a choice when considering whether or not to adopt a cloud solution? Important questions about cloud security 1. The key issue is the value of the data and then consider the following related questions: What will happen to data destruction? Will the business be completely terminated? Does system recovery cost a lot? Could it be a nightmare? " You really need to think about all sorts of situations, "Trembly said. 2. How would you protect your company's data? " How are you going to invest? Are you willing to buy and maintain an intrusion prevention system? You must be familiar with these problems. "What changes will you make to ensure that data is protected?" trembly says customers are most concerned about setting up employee policy and using personal equipment at work. However, it is still necessary to ensure that data protection is locked. "Ask yourself if you want to use portable devices to standardize management, so you don't have to worry too much, or make it a nightmare for people to volunteer to use these devices." "Trembly said. The more devices that people are allowed to use, the more opportunities there are for security problems. It's confusing to the IT staff. You can also make clear policy decisions about which employees are selected to access data security. Specify whether there are restrictions on their access rights, Trembly said. This is really important. Restricting access to unrelated people is a smart idea. But does this mean that other things can be done in one go? The cloud security problem exists since the cloud concept was put forward, people must ensure the safety when applying the new technology, because the security problem is the foundation of the enterprise development. "Editorial Recommendation" operators deploy "cloud security" to get triple benefit cloud computing security? 43% of companies questioned Cloud security company-Panda Safety released the latest 2012 product line qin Rob bit "cloud security" market "responsible editor: Liyan TEL: (010) 68476606" Original: Cloud security business information who to protect? Back to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.