Top 4 Misconceptions About The Cloud
If you listen to all the recent media chatter, you will see a picture that paints a grim outlook on the cloud. You may hear horror stories of how unsecure the cloud is, how data can get easily lost and how security breaches mean that the cloud should not be used to store any data, much less personal data. Well, these are opinions based on a few occurrences and the truth is, most of these security breaches and data losses occurred because of user error or lax security. The spread of misinformation by the media has caused some concern, as well there should be some concern. Security is not something to be taken lightly, especially if you have sensitive or confidential data stored in the cloud. Hopefully, some of these incidents will cause individuals and companies to wake up and implement the strongest security measures that are possibly available.
Here are some of the top misconceptions that have been spread by the media that may have you doubting that the cloud is the correct choice for you or your company.
Here are some of the top misconceptions that have been spread by the media that may have you doubting that the cloud is the correct choice for you or your company.
Top 4 misconceptions the media has told you about the cloud
Not Secure: The media has pounced and taken advantage of some recent security breaches and turned it around to make people believe the cloud is not secure. The truth is, if users were more security conscious and used better authentication measures, such breaches would not occur. There is a reason that "password" is still the most used password in the world today. People do not think that they are targets, so why should they worry about security?
Many hackers target people at random, just for fun. Some target people for monetary reasons, some to make political or other statements and some are targeted out of revenge. There is a host of reasons why people get targeted, but most of them never see it coming. Weak passwords and security challenge questions can be easily guessed or hacked.
Many cloud services offer extra security that many users just don't implement, such as two-factor authentication. Two-factor authentication is a method that allows users to input their password, at which time a code is sent to the user's mobile phone. The user then enters this code, and they have access to the account. This protects much better as a hacker must have access to both your password and your mobile phone in order to access the account. So even if your laptop gets stolen, and your password was saved on it, your data remains secure as long as the hacker does not have your mobile phone.
All extra security measures such as two-factor authentication should be implemented. The minor delay in accessing your account is very minuscule when compared to a security breach that could include data loss.
Complexity: While it is true that the cloud makes things a little harder on the IT department, the temporary hassle is worth it because it makes the cloud so simple to use. Once the IT guys have created all the security protocols for a secure data flow, the cloud can be used by practically anyone with no training necessary. If company data is to be accessed on mobile devices, these employees may need to be given specific instructions on how to correctly protect company data on mobile devices, but other than that, it's simple to use, not complex at all.
Useless without internet: This isn't exactly true either. Depending on what cloud providers you use, data is usually accessible offline. So documents, spreadsheets and presentations can all be worked on offline. Then, when you reach an area where internet is available again, the data will sync online with the cloud.
Also, in the case where a cloud provider's server goes down for maintenance or other reasons, it's advisable to have a secure backup plan in place with another provider. There are many third-party cloud backup services, such as cloudHQ, that provide a continuous replication of all data from one cloud provider to another. This ensures that if the server goes down for a bit, your work continues uninterrupted, while it also provides a secure backup that protects against data loss.
Expensive: This misconception couldn't be further from the truth. Utilizing the cloud means you can do away with most expensive hardware around the office. You can reduce your costs as you will not have the expense of buying, upgrading and maintaining hardware, storage space and servers. The cloud will take care of all of that. Those big, bulky file cabinets that take up so much room can be tossed in the scrap metal bin. With everything stored in the cloud, the cloud storage provider will take care of everything.
Also, with data accessible by mobile devices, employees can do their work from anywhere. They don't have to make costly and time-consuming trips to and from the office and can instead concentrate more on actual work instead of commute and other non-efficient problems.
The media's misrepresentation of cloud computing may have you worried about cloud security. It's good to be concerned and aware, but to panic and be afraid is just absurd. With the proper security measures in place and strong authentication, the cloud can be enjoyed in an easy and simple environment while remaining secure and keeping your data protected and safe. Thousands of companies make the move to the cloud every day. Others do their best to block access to the cloud. But one thing is certain- the cloud is the future. It's best to embrace it now and grow with it, as it opens up possibilities never seen before. Just don't let an uninformed media source ruin your thunder with misrepresentation of facts.
Many hackers target people at random, just for fun. Some target people for monetary reasons, some to make political or other statements and some are targeted out of revenge. There is a host of reasons why people get targeted, but most of them never see it coming. Weak passwords and security challenge questions can be easily guessed or hacked.
Many cloud services offer extra security that many users just don't implement, such as two-factor authentication. Two-factor authentication is a method that allows users to input their password, at which time a code is sent to the user's mobile phone. The user then enters this code, and they have access to the account. This protects much better as a hacker must have access to both your password and your mobile phone in order to access the account. So even if your laptop gets stolen, and your password was saved on it, your data remains secure as long as the hacker does not have your mobile phone.
All extra security measures such as two-factor authentication should be implemented. The minor delay in accessing your account is very minuscule when compared to a security breach that could include data loss.
Complexity: While it is true that the cloud makes things a little harder on the IT department, the temporary hassle is worth it because it makes the cloud so simple to use. Once the IT guys have created all the security protocols for a secure data flow, the cloud can be used by practically anyone with no training necessary. If company data is to be accessed on mobile devices, these employees may need to be given specific instructions on how to correctly protect company data on mobile devices, but other than that, it's simple to use, not complex at all.
Useless without internet: This isn't exactly true either. Depending on what cloud providers you use, data is usually accessible offline. So documents, spreadsheets and presentations can all be worked on offline. Then, when you reach an area where internet is available again, the data will sync online with the cloud.
Also, in the case where a cloud provider's server goes down for maintenance or other reasons, it's advisable to have a secure backup plan in place with another provider. There are many third-party cloud backup services, such as cloudHQ, that provide a continuous replication of all data from one cloud provider to another. This ensures that if the server goes down for a bit, your work continues uninterrupted, while it also provides a secure backup that protects against data loss.
Expensive: This misconception couldn't be further from the truth. Utilizing the cloud means you can do away with most expensive hardware around the office. You can reduce your costs as you will not have the expense of buying, upgrading and maintaining hardware, storage space and servers. The cloud will take care of all of that. Those big, bulky file cabinets that take up so much room can be tossed in the scrap metal bin. With everything stored in the cloud, the cloud storage provider will take care of everything.
Also, with data accessible by mobile devices, employees can do their work from anywhere. They don't have to make costly and time-consuming trips to and from the office and can instead concentrate more on actual work instead of commute and other non-efficient problems.
The media's misrepresentation of cloud computing may have you worried about cloud security. It's good to be concerned and aware, but to panic and be afraid is just absurd. With the proper security measures in place and strong authentication, the cloud can be enjoyed in an easy and simple environment while remaining secure and keeping your data protected and safe. Thousands of companies make the move to the cloud every day. Others do their best to block access to the cloud. But one thing is certain- the cloud is the future. It's best to embrace it now and grow with it, as it opens up possibilities never seen before. Just don't let an uninformed media source ruin your thunder with misrepresentation of facts.
Related articles
- 9 top threats to cloud computing security (infoworld.com)
- Growth in cloud security market underscores fears about data loss (blogs.blouinnews.com)
- Cloud security fears: justified or hot air? (xlntelecom.co.uk)
- Global Revenues From Cloud Security Services To Leap 83% By 2016 (misco.co.uk)
- Cloud security still top concern for UK CIOs, survey shows (computerweekly.com)
- Cloud Security Alliance (CSA) says Data Breach, Loss Top Cloud Threat List (fortinet.com)
- BYOD and data protection top concerns with cloud adoption (net-security.org)
- Secure Yourself by Using Two-Step Verification on These 16 Web Services (uglyduckblog.wordpress.com)
- Evernote Breach: What It Means To Enterprise IT - InformationWeek (informationweek.com)
- Cloud Security Study: BYOD, Data Control and Data Loss Are Main Inhibitors (news.softpedia.com)