Double protection allows corporate cloud computing to stop revealing privacy

Source: Internet
Author: User
Keywords nbsp cloud computing investigation cyber crime

2012 Small and medium-sized enterprises will be more focused on the cloud, as small and medium-sized enterprises on cloud computing concern, the http://www.aliyun.com/zixun/aggregation/11233.html "> The problem of security risks has also aroused people's attention again, September 2011 Toronto's Science and technology news website itbusiness.ca 300 Small and medium-sized Enterprises survey crowd, about 35% of people said the most concern for cloud computing is still security issues.


Most cloud providers today have the software services they need to run cloud computing on their servers and provide a complete application in which the vendor ensures that the customer's cloud services are secure.


Vendor Cloud computing Services matrix

Customers must also be more secure, actively looking for possible defensive holes, and ensure that the backup disk is encrypted before leaving the supplier.

Cloud threatens to climb every year

Regardless of the security of the cloud service provider, remote cloud computing means that the data is based on the business and services between a public network, so if you are transmitting sensitive data, it should be encrypted at the time of transmission. Another benefit of data backup is that when cloud providers terminate service delivery, the need to cloud computing in insecure situations ensures that you can back up your data.



Pictures from the network

With the cost of cyber crime getting higher, research conducted by the Ponemon Research Institute, which investigates cybercrime last summer, in Traverse City, Michigan, shows that American companies spend $590 million a year on defending against cybercrime. The survey grew 56% per cent from the July 2010 Ponemon survey.


Pictures from the network

The Ponemon Institute has studied cyber crime for many years, although only two surveys have been conducted, but this particular investigation is still highly valued by American companies. "Criminals in cyber-crime will be more complex than real-life crimes," said Larry Ponemon, chairman and founder of the network.

Summary: The 2012 threat to cloud computing still exists, hackers continue to attack also enhanced cloud computing maintenance costs, how to save costs while the security protection is still the 2012 cloud computing a big test.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.