Tego

Worried about Cloud Security?

Since the emergence of cloud computing, the term “Cloud Security” has been somewhat of an oxymoron. The sheer amount of financial and private data in the cloud (of businesses, consumers, employees) is an attractive target for attack. While security risks may not be new or exclusive to the cloud, the cloud allows for larger attacks. While improving Cloud security and privacy is an ongoing battle, we can look to some leaders in public cloud computing services to find some current practices for improving cloud security.

End-to-end Encryption

Once data is in the cloud, there must be encryption at all stages: data must be encrypted at-rest (in storage) and on-the wire (anywhere in transit) to minimize privacy risks associated with data breaches. Google has a policy of encrypting data between its own data centers. New software/service solutions such as cloud encryption gateways offer encryption and tokenization algorithms and give customers exclusive control of the encryption key (and sensitive data) rather than sharing it with the cloud provider.

Multi-factor Authentication

To prevent unauthorized access to its iCloud servers, Apple now requires two-factor authentication and a login code; it is using fingerprint identification on new products instead of passwords and protecting mobile payments by randomly generating codes for each payment made. Salesforce.com uses two-factor authentication with time-based one-time passwords as well as risk scores whenever login attempts are made. Other risk-based authentication measures such as device authentication, geo-location and user activity are available to mitigate ID theft, data breaches and fraud.

Shared Security Responsibilities

As a cloud service provider (CSP), Amazon details its practices for providing physical and network security and administrative controls up to the hypervisor (virtual machine level) while its cloud customers are responsible for defensive security controls for the guest operating system (including ID and access management), middleware and applications.

Geo-Redundant Storage and Audits

To mitigate loss of public and private data and provide a defense against cloud outages (including denial of service attacks), CSPs should offer a primary and a secondary location (of the customer’s choosing) for redundant storage, backup and failover capability. CSPs should also be willing to undergo a third-party audit and security certification and background checks for developers who write cloud service code, to mitigate risks of insider attacks and theft of customer data.

Bottom line: Don’t have your head in the clouds when using cloud services. Keep up with new challenges and use every security and control measure available—from enhanced encryption to identity-proofing to retention of audit records—to protect data in the public cloud. The information for this article was provided by the professionals at Virtual Technology, who offer Oracle third party maintenance support.

PHOTO CREDIT: Flickr Creative Commons via Perspecsys Photos

Dixie Somers

About Dixie Somers

Dixie is a freelance writer who loves to write for business, finance, and women's interests. She lives in Arizona with her husband and three beautiful daughters.

Dixie Somers

Top Posts | Data Management

3 Cloud Alternatives to Keep Your Business Data Safe

Cloud storage has received a great boost recently as it is the most authentic and cost-effective solution for storing an enormous amount of business data. According to a number of studies, about 82% of enterprises stated that cloud storage software helped them to save a substantial amount of money. ...

VPN Can Give Greater Security to Your Transactions

We do so much online these days. We communicate online, send stuff online, shop online, play online games, watch movies, listen to music, pay bills online, and even bank online. When doing transactions or activities that deal with more sensitive data like bank accounts, credit card numbers and pers ...

Is the Next Big Security Threat Car Hacking?

Today, automobiles offer you the convenience of hands free communication and GPS systems. As the automobile revolution advances and the cars incorporate more wireless communication and navigation systems, they become more vulnerable to hackers. Security experts say that the idea of hacking cars isn ...

Saas Needs to Do Better with Data Recovery

Whenever people talk about SaaS, or Service as Software, they always think of the internet and the endless bounds of opportunity, waiting for someone who can control that force and turn it into something profitable. The internet is a place of endless possibilities, and it hasn’t ceased to imp ... ...

10 Steps to Secure Your Network from Unwanted Attacks

Businesses today rely on technology as their primary mode of communication. However, the more we use electronic devices to communicate, the more we leave our business open to personal attacks. Cybercriminals take advantage of unsuspecting businesses to hack their network and steal confidential info ...

How Can SMBs Benefit from the Cloud?

There are many reasons why small to medium-sized businesses (SMBs) should migrate to the cloud. SMBs have a greater opportunity to grow their business and save money on maintaining on-premises servers. Furthermore, when your business grows, there’s no need to buy more storage space or invest ... ...

Bloggers Should Shift to VPN

Blogs and VPN are two technical terms that most of us in this generation probably know about. It is advantageous for bloggers to use VPN, but the question is why.As of right now, there are millions of blogs on the Internet. These blogs cover a wide range of topics and their popularity has risen ove ...

Why Your Company Needs a VPN or Proxy Service

Once you log-on to the Internet and visit a website, your personal information is recorded. Websites now record your IP address, country, hosting service, your computer’s MAC address, browser, and browsing history. Furthermore, websites can locate your computer’s name if you use the pro ... ...

How to Become a Password Guru

How many times do you have to hear about an account being hacked because a person was too lazy to create a secure password? This story is sad, but true. Thousands of people around the world are being hacked each day. Password security is your only defense against a hacker breaking into your account ...