Monthly Archives: April 2018

Technology Trends

Building a Solid Security Foundation in the Cloud

With more and more businesses putting their data in the Cloud, most agree the benefits of doing so outweigh the risks. However, there are still risks to consider, both before and after selecting a Cloud Service Provider. Read on to find out about these as well as to learn how to manage security in the Cloud.      

Making Your Business Cloud-Ready

According to a Computing Technology Industry Association (CompTIA) report, “Assessing the Cloud Security Landscape,” 85% of business and IT professionals are confident in their Cloud Service Provider. Cloud computing is certain to grow even more in coming years. What cloud security concerns are top of mind for business owners and IT professionals? What do they need to consider before migrating to the Cloud?

Three of the key concerns business owners have are about business downtime and disaster recovery, loss or exposure of data when it migrates to the cloud, and the safety of data, through encryption, when the data is in motion and at rest. Other concerns include the physical location of data centers and shared technology concerns in multi-tenant environment. In spite of these concerns, only 3 in 10 business owners do a comprehensive evaluation, according to CompTIA.

Questions to Ask Your Cloud Service Provider

Before selecting a Cloud Service Provider, ask yourself and the potential provider some important questions. First, should all of your data be in the cloud? If you are responsible for compliance with regulatory standards, or if your data is proprietary or competitive, the cloud might not be the right place for the more sensitive information. Be sure to have a solid IT infrastructure to handle the data that needs to be more closely guarded. Another factor related to regulatory compliance is the physical location of the provider’s data center. Where does it reside and how does that affect compliance to regulatory standards? Also ask about the provider’s encryption policies and their business interruption and disaster recovery plans. All of these considerations are key to staying secure in the cloud.

Keeping Your Business Secure

Once you have decided to use the cloud, you still need to take the responsibility to keep your data safe. Ensure that your network is in compliance; it is only as secure as its weakest point. Make sure to have the most current operating system patches as well as up-to-date anti-virus and anti-malware definitions. Also, establish a policy for establishing and maintaining passwords. Educate your employees in choosing strong passwords—a combination of upper-case and lower-case letters, numbers and special characters can make passwords “unhackable.” Emphasize that employees should change their passwords regularly, and that they have a stake in protecting their own and your company’s data.

Has your company reviewed how you want to handle security, reliability, compliance, and legal issues related to your cloud service? If not, consider contacting a cloud computing professional to review your cloud security policies today.

Planning for Disaster Recovery

We hear in the news every day about natural disasters such as fires, floods, storms and even earthquakes, and know the damage they cause. But what about the potential consequences for your business? What if your business stays closed for a period of time, and loses revenue because your information systems are unavailable? Or if a cyberattack occurs that results in a data breach that compromises your business’s reputation? Read on to learn more about how to make a disaster recovery and business continuity plan.

The Importance of Having a Plan

Disaster Recovery and Business Continuity consists of processes used to prepare for disruptive events, whether natural or man-made. Having a plan will help you know what to do and how to do it in events that can result in downtime for your business. Your plan can prevent loss of revenue, as well as loss of reputation. It can even help keep your business in business.

Assessing Your Risks

Think first of your mission-critical applications–your phone system, email system and maybe even processing orders. Consider how much downtime you can risk, having these systems out of commission. Tabulate  potential overhead, loss of employee wages and revenue over the course of hours, days or weeks. Systems needing to take priority are the ones that keep your business running smoothly, keeping revenue flowing and employees productive. Other applications, including shared files, can be backed up and retrieved.  Along with mitigating financial risk, a plan can guard against potential damage to your business’s reputation resulting from a data breach, or being unavailable in the event of a natural disaster.

Implement, Test and Monitor Your Plan

Once you know your risks, you can find a plan with solutions in line with your goals. One issue in implementation is making sure you have alternate systems of backup in case one system fails. Make sure to have this redundancy built into your plan. Before your plan even “goes live,” test it for restoration and recovery processes. Monitor your backup on an ongoing basis, to find and correct problems as they occur. Don’t forget the human element, and educate your employees on how to respond in a disaster scenario.

Having a plan in place can make all the difference for your business. Contact your technology advisor today to help evaluate your risks and get prepared.