{"id":221793,"date":"2017-06-21T09:04:53","date_gmt":"2017-06-21T13:04:53","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/three-considerations-for-reducing-risk-in-cloud-computing-cioreview.php"},"modified":"2017-06-21T09:04:53","modified_gmt":"2017-06-21T13:04:53","slug":"three-considerations-for-reducing-risk-in-cloud-computing-cioreview","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/three-considerations-for-reducing-risk-in-cloud-computing-cioreview.php","title":{"rendered":"Three Considerations for Reducing Risk in Cloud Computing &#8211; CIOReview"},"content":{"rendered":"<p><p>      Augustine Doe, VP, Enterprise Risk Management, Network Health    <\/p>\n<p>    Organizations continue to migrate dataone of their key    assetsto the cloud for a variety of reasons: optimizing    capacity, providing 24\/7, 365-day access to data, backing up    essential information, and improving collaboration between    users. While such increased reliance on the cloud speaks to the    multiple benefits the cloud provides, it also is forcing    organizations to confront the various risks cloud computing    poses. This article summarizes three practical considerations    for any organization looking to reduce risk in cloud computing.  <\/p>\n<p>    Inbound to the cloud: Encrypted    or secured data passage to the cloud always reduces the risk of    third-parties being able to intercept the data. This is    particularly important for data likely to be used by bad actors    for nefarious purposes. Payment Card Information (PCI),    Protected Health Insurance (PHI), Personally Identifiable    Information (PII), and Non-card Financial, and Confidential are    among the most desirable kinds of data to bad actors.  <\/p>\n<p>    At rest in the cloud: Reviewing    the fine print in each cloud agreement regarding the type of    security provided by the cloud owner when data is at rest goes    a long way to enhancing an organizations overall cyber    posture. Most fee-free cloud storage agreements provide little    of any data protection, so an organization needs to perform its    due diligence on the type of protection provided by the cloud    provider in each cloud agreement.  <\/p>\n<p>    Encrypted    or secured data passage to the cloud always reduces the risk of    third-parties being able to intercept the    data  <\/p>\n<p>    For instance, depending on the type of data and the location    where it will be stored, the level of data security would need    to comply with a specific minimum level as required by state,    federal, and international laws. The organization should know    what level of security their data must have to be compliant    with any applicable laws.  <\/p>\n<p>    Outbound data to users: An organizations data    protection efforts come to naught if data leaving the cloud    destined for users do not receive appropriate protection. As    part of the organizations practices for managing third parties    (e.g., vendors, reporting agencies, regulators, joint venture    partners, franchisees, etc.), users of data should be    constantly reviewed for sound data security practices, such as    Service Organization Controls (SOC 1 and 2). Also, the    organization needs to stay on top of its access, security, and    change management protocols and controls and constantly educate    employees and third parties about the importance of sharing    each type of data through the appropriate medium.  <\/p>\n<p>    Data containing PCI appears to be the data most desired by bad    actors. According to Verizons 2016 Data Breach Report, 27    percent of 53,100 PCI records (using the median value of    records for each type of data observed) experienced breach    incidents compared to 11 percent of 1,000 PHI records; 48    percent of 761 PII records; and percent of 55 Non-card    Financial records. Because PCI data is most desired, its    movement in and out of the cloud should be afforded a higher    level of protection, e.g., encryption, as part of any    organizations overall data security management.  <\/p>\n<p>    Bad actors are constantly exploring potential weak links to    find easy ways to penetrate an organizations data value chain.    The cloud should not be considered a shield nor does it by    default make data more secure. Data on its way to the cloud, at    rest in the cloud, and leaving the cloud should continue to be    managed by the organizations appropriate security, change, and    access management protocols and controls in real time. To    assist organizations in performing real-time management, a    variety of security firms provide year-round, 24\/7 enforcement    of security, change, and access management protocols and    controls.  <\/p>\n<p>    Cloud computing has become a staple of many organizations    operations and several factors suggest both volume and demand    will increase. First, the amount of data that organizations    must analyze to make sound business decisions continues to grow    and therefore organizations need to optimize capacity both to    store and analyze data. Second, the ongoing maturation of the    service sector in the U.S. economy means businesses need 24\/7    access to data to remain competitive. Third, as bad actors    become more and more sophisticated, organizations need to stay    extra vigilant not only in protecting data but in having an    avenue to recover data and to remediate in the event of    corrupted data. Data backup is an excellent fallback position    to deploy in the event of corrupted data. Finally, the    increasing complexity and interconnectedness of business    continues to push organizations to collaborate more with each    other and the cloud provides a great avenue for this    collaboration.  <\/p>\n<p>    The optimal approach to managing risk in cloud computing is for    an organization to clearly understand the security afforded its    entire data value chain, the types of data that are most    susceptible to loss or misuse, and for the organization to    continue to enforce security, change, and access management    protocols and controls in real time. Only when these steps are    taken can an organization feel that it has a robust front for    managing and protecting one of its most critical assets.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/redhat.cioreview.com\/cioviewpoint\/three-considerations-for-reducing-risk-in-cloud-computing-nid-24652-cid-104.html\" title=\"Three Considerations for Reducing Risk in Cloud Computing - CIOReview\">Three Considerations for Reducing Risk in Cloud Computing - CIOReview<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Augustine Doe, VP, Enterprise Risk Management, Network Health Organizations continue to migrate dataone of their key assetsto the cloud for a variety of reasons: optimizing capacity, providing 24\/7, 365-day access to data, backing up essential information, and improving collaboration between users. While such increased reliance on the cloud speaks to the multiple benefits the cloud provides, it also is forcing organizations to confront the various risks cloud computing poses. This article summarizes three practical considerations for any organization looking to reduce risk in cloud computing.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cloud-computing\/three-considerations-for-reducing-risk-in-cloud-computing-cioreview.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[494695],"tags":[],"class_list":["post-221793","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/221793"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=221793"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/221793\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=221793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=221793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=221793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}