Image

- Fear – “It will kill us all!”
- Personal struggle to make sense of the new technology – “It will steal my daughter!”
- Denial of its usefulness – “I’ll never use it!”
- Acceptance – “What are you going on about?”
Background: Opinions on Cloud Security in the Enterprise Market
How does legacy system security compare to cloud security? Sixty-four percent of IT professionals say the Cloud is more secure than legacy systems. But breaking the data down shows that 38 percent see the Cloud only as “somewhat more secure” rather than “much more secure.” This leaves a quarter of respondents unsure about whether the quality significantly differs, with roughly 10 percent doubting the efficacy of cloud security overall. High-profile data breaches at Target, Home Depot and in the Apple iCloud received a lot of media attention. However, the media ignored that all three breaches were a result of human error, not shortcomings in the Cloud. For example, in the cases of Target and Home Depot, hackers got ahold of personal information from third-party vendors and not by hacking the Cloud. Incidents of this nature, combined with a lack of knowledge about the safeguards that exist to protect data stored in the Cloud, paralyze businesses in stages two and three of the fear-technology paradox.“I think what we’re seeing now, when it comes to the Cloud and security, is a bit of a myth that the Cloud is less secure. I’ve heard this many times, but it does not seem to be true in real life.” — David Linthicum, Senior Vice President, Cloud Technology PartnersFour features of cloud security demonstrate why fear of the Cloud is more of a myth than a reality. 1. Strong Perimeters and Surveillance for Legacy Systems Legacy system security can be unreliable and difficult to implement. They include the terminal, workstation and browser. Legacy systems originated before computer crimes became prevalent. Therefore, preventing access to on-site computers often was enough to block hackers. But businesses still rely on these systems today, often using them in tandem with cloud infrastructure and backup and recovery services. This makes legacy systems increasingly vulnerable to hackers. Additionally, assessing legacy system security concerns is a multi-step process, with the best option being to replace the legacy system itself. In most offices, a locked door is the main defense to protect IT equipment, important files, and personal- and business-related data. In contrast, the top cloud service providers’ (CSP) data centers have multi-layered security defenses. Precautions include high fences, barbed wire, concrete barriers, guards that patrol the area, and security cameras. These physical barriers not only prevent people from entering the data center. They also monitor activity near the space. 2. Controlled Access When data is stored off-site in the Cloud, employees, vendors and visitors are physically separated from a company’s mission-critical data. This lack of physical access makes it more difficult for third parties to stumble across data and use it negatively. The amount of human risk decreases. 3. Cyber Security Expertise CSPs specialize in keeping data safe. Cloud infrastructure is monitored at all times in order to head off potential security threats.
“If you were to look at the skill set in a single organization and compare it to another organization that specializes in a specific solution, all things being equal, you would expect the specialized company to provide the best service. This is how it is with the Cloud. The cloud vendor will have good, if not better, security and support for security than any one company.” — Duane Tharp, Vice President of Technical Sales and Services, Cloud-ElementsWith the Cloud, you get access not only to the best data centers but also to highly skilled IT professionals. 4. Thorough and Frequent Auditing CSPs undergo yearly audits to protect against flaws in their security systems. However, on-premise, legacy systems do not have this requirement.
“If you have an on-premise solution for five years, within those five years, it may get audited once, which leaves room for gaps in security to arise.” — Jason Reichl, CEO, Go NimblyAdditionally, legacy systems can be difficult to update, especially as they grow alongside the company.
“Legacy systems are more difficult to keep updated because enterprises may have to go around to several hundred thousand platforms to check and update security systems. It’s easier for legacy systems to fall behind.” — David Linthicum, Senior Vice President, Cloud Technology Partners
Final Takeaway
As more businesses begin using the Cloud, it is inevitable that they will see tangible benefits, such as improved business efficiency, better access to data and security. These benefits will fuel the transition to stage four on the technology-fear continuum — “acceptance.” Big data, virtual reality and the Internet of Things (IoT) are stealing the technology industry’s spotlight now. All three new technologies work in tandem with the Cloud. Greater reliance on cloud services will quell remaining security concerns and indirectly show how the Cloud is more secure than antiquated on-premises systems. To learn more about staying secure in the cloud, find out what 18 experts advise for effective and secure cloud migration, here.Image

Image
