Monthly Archives: June 2015

Happy business team

7 Security Myths About Cloud Computing

By | Uncategorized | No Comments

As cloud computing becomes more popular in the business world, questions about cloud computing and security around cloud computing are arising. There are still many IT professionals and corporate decision makers that are leery of cloud security because of the myths and misconceptions surrounding the technology. We’re ready to debunk 7 of the most common myths about cloud computing security.

Myth #1: The Cloud is insecure.

Perhaps the biggest myth relating to cloud computing is that your data is not safe in the cloud. This simply isn’t true. The natural perception is to believe that things outside of your control (or outside of your hosted server’s control) are less secure. However, dozens of experts are recognizing that cloud providers have greater expertise and more technical staff to handle all of your security concerns. Cloud companies are beginning to spend at a scale that cannot be matched by a single organization. That means more cloud security for the end user.

Myth #2: The cloud is easily breached.

The cloud is accessed publicly, but that doesn’t mean your infrastructure is available to everyone on the public Internet. There may not be as many trained professionals with skills to secure cloud applications, but when you trust professionals who are specifically trained in cloud computing, you can rest assured that your data is safe and secure. The same breaches that happen in the cloud can also happen in a private data center.

Myth #3: The end user is powerless when it comes to cloud security.

As an end user, you have some control over security. It’s up to you to exert that control. You can control your cloud data and you can also control your relationship with your cloud provider. Simon Bain, SearchYourCloud CEO, notes that on a corporate level, this means not allowing the cloud provider to hold encryption keys. On a personal level, be careful what information is stored in the cloud, especially when it comes to your social networks, shopping online, and online banking activity.

Myth #4: The Cloud is all about the money.

While using the cloud is sometimes a cost-effective measure, not all cloud services are inexpensive. For example, Infrastructure as a Service (IaaS) is seeing a price drop, but Software as a Service (SaaS) remains at a consistent price. Assuming that cloud computing always saves money will limit the opportunities using the cloud can provide. Saving money may end up being one of the best benefits for switching to the cloud, but there’s much more to consider.

Myth #5: You can’t control your data in the cloud.

If you run a global company, your data is going to be traveling all over the world. Unless you want to build multiple data centers, you’ll need cloud service providers to operate locally. You’ll need these providers, but you’re still in control of where your data travels. You’re responsible for following local data protection regulations and for knowing how your data is protected. Instead of arranging for local providers to keep track of all your information, a global cloud service provider can operate data centers in multiple countries, while keeping you up-to-date on local regulations. When workloads being moved to the cloud require it, a private cloud is a simple way to address data governance.

Myth #6: Security strategies can wait.

Setting and defining a cloud security strategy should be top priority for both the company and the IT department from the get-go with any cloud deployment. Not thinking about strategy is a big risk your business shouldn’t take. Even after proper security measures are in place, on-going monitoring and reporting should always remain at the top of the to-do list.

Myth #7: Cloud security is too difficult to maintain.

Believing this myth leads companies to either compromise security in the name of business requirements or leads companies to refrain from using the cloud for critical applications. Security issues for the cloud and on-premise data centers are similar. Firewall configurations, testing, and VPNs are all just as important when using a cloud provider as they are when working with traditional security methods.

It’s easy to understand why so many people are confused about the vulnerability of cloud computing. Fortunately, after separating the fact from the fiction, the benefits of cloud computing, along with their security measures, shouldn’t be hard to grasp.