{"id":217170,"date":"2017-06-06T18:08:18","date_gmt":"2017-06-06T22:08:18","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/how-to-approach-cloud-computing-and-cyber-security-in-2017-information-age.php"},"modified":"2017-06-06T18:08:18","modified_gmt":"2017-06-06T22:08:18","slug":"how-to-approach-cloud-computing-and-cyber-security-in-2017-information-age","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/how-to-approach-cloud-computing-and-cyber-security-in-2017-information-age.php","title":{"rendered":"How to approach cloud computing and cyber security in 2017 &#8211; Information Age"},"content":{"rendered":"<p><p>      IDC predicts that the cloud computing market in 2017 will be      worth $107 billion and, according to Gartner, by 2020 a      corporate no-cloud policy will be as unusual as a      no-internet policy would be today    <\/p>\n<\/p>\n<p>    The adoption of cloud computing has been on the up since as far    back as 2008, when a survey conducted by the Pew Research    Institute found that cloud services were used by nearly 69% of    Americans. Since then, the industry has experienced    hyper-growth and exceeded the already vast predictions of how    big it would become.  <\/p>\n<p>    IDC predicts that the cloud computing market in 2017 will be    worth $107 billion and, according to Gartner, by 2020 a    corporate no-cloud policy will be as unusual as a    no-internet policy would be today. Indeed, it would be    difficult to imagine an organisation in 2017 that did not use    webmail, file sharing and storage, and data backup.  <\/p>\n<p>    As the use of cloud computing spreads so does awareness of the    associated risks. At the time of writing, there have been 456    data breaches worldwide this year according to the Identity    Theft Resource Center (ITRC). The ITRC also noted a 40%    increase in data breaches in 2016 compared to the previous    year. Yet, despite the well-documented cases of data breaches,    organisations continue to invest in and adopt cloud computing    services because the benefits usually outweigh the risks.  <\/p>\n<p>    To understand why the growth of cloud computing has continued    in the face of high-profile data breaches, look first to what    it can offer an organisation.  <\/p>\n<p>    >See also:     Building trust in cloud security is crucial to UKs digital    future  <\/p>\n<p>    Cloud computing is a virtual environment that can adapt to meet    user needs. It is not constrained by physical limits, and is    easily scalable  making it an obvious choice for start-ups.    Cloud computing makes state-of-the-art capability available to    anyone with an internet connection and a browser, reducing    hardware and IT personnel costs.  <\/p>\n<p>    Cloud services and software applications are managed and    upgraded off-site by the provider, meaning organisations can    access technology they would not have been able to afford to    install and manage on their own. The popularity of the cloud    essentially comes down to its provision of advanced,    next-generation IT resources in an environment that is cheaper    and more scalable than local networks.  <\/p>\n<p>    The risks involved with cloud computing are mostly    security-based. Clouds are often made up of multiple entities,    which means that no configuration can be more secure than its    weakest link. The link between separate entities means that    attacks to multiple sites can occur simultaneously. When cloud    providers do not employ adequate cyber security measures, those    clouds become a target for cybercriminals.  <\/p>\n<p>    Yet, its not all bad news. A user survey conducted by one    cloud service provider found that concerns about security fell    to 25% compared to 29% last year. And as more becomes known    about security risks so too does our knowledge around what    organisations can do to protect themselves.  <\/p>\n<p>    The Cloud Security Alliance (CSA) released its Treacherous    Twelve in March 2016 detailing the top 12 threats to cloud    security based on responses from their members. At the top of    this list was data breaches.  <\/p>\n<p>    Any leak or exposure of sensitive information  such as    usernames, passwords, credit card numbers, social security and    health records  constitutes a data breach. The organisation,    and not the cloud service provider, is ultimately accountable    for keeping their data secure.  <\/p>\n<p>    When a data breach does occur, a company could be fined or face    criminal changes, regardless of whether it was intentional or    not. Even though cloud service providers will deploy a high    level of security measures, the CSA advises organisations to    implement a multifactor authentication and encryption system on    the user end to protect against data breaches. This could    involve single-use passwords, smartcards, or phone-based    authentication.  <\/p>\n<p>    These multifactor authentication processes can also work to    prevent the occurrence of compromised credentials, which can    expose an organisation to a data breach. Commonly, data    breaches and cyber security attacks rely on lax security    systems like predictable passwords and poor certificate    management.  <\/p>\n<p>    Allocating permissions within an organisation is another area    where credentials could be compromised if they are misallocated    or not removed when a user leaves or changes roles. As well as    multifactor authentication, companies should prohibit the    sharing of account credentials and ensure permissions are    allocated or removed as soon as is necessary.  <\/p>\n<p>    Organisations can also increase their chances of avoiding a    data breach by implementing proper training. Innocent mistakes    can often look like deliberately harmful insider activity.    Would your data administrators ever unintentionally copy    sensitive customer information over to a publicly accessible    server? The only way to be truly confident in a workforce and    prevent mistakes happening in the cloud is to implement correct    training and management.  <\/p>\n<p>    While the cloud may differ to local networks in many ways, its    data centres remain just as susceptible to damage or    destruction by natural disasters. To avoid losing data to fires    and floods, distribute data and applications across more than    one zone. Implement appropriate data backup procedures, and    adopt best practices in business continuity and disaster    recovery.  <\/p>\n<p>    Consider using off-site storage for data that, if lost, would    result in its own kind of disaster. As the General Data    Protection Regulation (GDPR) start date approaches, protecting    your data is more important than ever. GDPR sees both data    destruction and corruptions as serious breaches.  <\/p>\n<p>    >See also: What    to do when it comes to cloud security?  <\/p>\n<p>    It would be unwise  and certainly a bad business decision     for an organisation to not take advantage of the technological    advances made by the cloud. More than that, however, cloud    computing services and applications also support growth in a    way that traditional IT hardware cannot. Whether it is a    start-up with a handful of staff, or a multinational    corporation with a headcount of thousands, the cloud continues    to be the way of the future.  <\/p>\n<p>    Over the next years and decades, the regulations and laws    around data in the cloud will come into maturity. Like many    times in the past, governments are moving slower than the    technology when it comes to implementing policies and law.    Decisions made in the courts will instead set the precedent of    who is ultimately responsible for the security of information    stored within the cloud. In the meantime, organisations around    the world can focus on self-regulation as they tackle cyber    security in the cloud.  <\/p>\n<\/p>\n<p>    Sourced from Dean Sappey, president and co-founder,    DocsCorp  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.information-age.com\/approach-cloud-computing-cyber-security-2017-123466624\/\" title=\"How to approach cloud computing and cyber security in 2017 - Information Age\">How to approach cloud computing and cyber security in 2017 - Information Age<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> IDC predicts that the cloud computing market in 2017 will be worth $107 billion and, according to Gartner, by 2020 a corporate no-cloud policy will be as unusual as a no-internet policy would be today The adoption of cloud computing has been on the up since as far back as 2008, when a survey conducted by the Pew Research Institute found that cloud services were used by nearly 69% of Americans. Since then, the industry has experienced hyper-growth and exceeded the already vast predictions of how big it would become.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/how-to-approach-cloud-computing-and-cyber-security-in-2017-information-age.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[494695],"tags":[],"class_list":["post-217170","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/217170"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=217170"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/217170\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=217170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=217170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=217170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}