With cloud infrastructure, security is a common concern. It makes sense: “If my data moves from inside my company to somewhere outside my company, how safe is it? Is cloud data secure?”

Security requirements for cloud-based environments are often easily met. In fact, there are times when moving to a cloud solution is safer than leaving data in-house.

Here is a real-life, anonymous example from an i3 client of years past:

Company X had an onsite email server. It was maintained pretty well. While a few years old, it was kept up to date with patches on a regular basis. The users had a mix of new PCs and old – upgrades were performed based on need and budget.

Unfortunately, the day came where the client was hacked. Said hacker was able to penetrate into the network by accessing an older PC – the operating system was antiquated enough that a hacker compromised it. Once on the network, the hacker found the mail server. Once on the server, the hacker set up a mail relay and used the mail server to send out spam emails, as well as act as storage for additional malware tools.

Despite the preventative efforts, in just one day the mail server was covertly hijacked and used as a spam sender and tool hosting platform.

"Businessman Holding Smart Phone" by pakorn / freedigitalphotos.net

"Businessman Holding Smart Phone" by pakorn / freedigitalphotos.net

Take the above example and move it to present day. We have clients who are moving to cloud-based technologies. Mail is a common starting point, but also servers, file storage, phones and other critical IT components. A cloud solution would have definitely helped Company X. In the case of email, cloud technologies would’ve given them a higher level of security - both at the server and at the PC. The factors that allowed this kind of hack would not be present.

Cloud services hosts (think Microsoft and Google) are more secure because they have to be. They are not a single-business shop like Company X, their services need to be able to scale as large or small as needed, and they must ensure compliance security and access requirements (like HIPAA, ISO 27001, HITECH and more).

The above is a generalized example of the benefits of cloud security versus in-house. But, specific to your business, the next step is to look in more detail at your company’s expectations, its security compliance needs, and the tools, infrastructure and people who hold and maintain your data.

Many businesses believe that data being physically inside their building is an indicator of safety. Conceptually, you’re putting your data inside of a vault, surrounded by thick, welded, fireproof steel walls that could withstand any reasonable attack. The vault seems secure, but don’t mistake this for an illusion of security, because those steel walls are not the only attack vector. The lock (your data’s encryption, methods of access, security settings and other aspects provided by any quality cloud vendor) is another point of failure. The walls are easy to qualify. Next step: Focus on the lock.

Cloud Solutions are i3 Business Solutions

i3 Business Solutions provides Cloud consulting services. Our goal is not to sell you all things Cloud, but to first determine if it’s even appropriate for your business. Based on that analysis, we then provide design and implementation services. Yes, Cloud technology is the latest IT buzzword, but it’s justified: Only a few years ago, the industry didn’t have the capacity or infrastructure to support Cloud as it exists today. Now that Cloud is here, we see the benefits it brings to our clients.

The Cloud is just another technological tool, but it’s a powerful one that can improve your business. We at i3 know how to use it; we’d like to share that knowledge with you.

Learn more: http://i3bus.com/Cloud or email your inquiries to Cloud@i3bus.com.

Get in touch with i3 Business Solutions today

At i3 Business Solutions, we use the best technology to partner with local businesses to transform IT departments and improve business productivity. Contact us here or fill out the form below:
  • Hidden

Published with permission from TechAdvisory.org. Source.