Avoiding Data Breeches in the Cloud

Avoiding Data Breeches in the Cloud

Deploying large scale systems such as enterprise resource planning in the cloud through a secure hosting provider allows in-house IT more time to focus on data security on-premises.

29319700_l

Avoiding data breeches in the cloud is top of every CIO’s mind since recent breeches such as Sony and iCloud hacks have caught everyone’s attention in the media.  The commonality in all of these breeches was hackers exploiting weaknesses in traditional systems that companies hadn’t addressed, according to David Linthicum with InfoWorld.

“Security needs to be systemic. Security can’t be a bolt-on at the end of the build process. Instead, it must be continually updated during the life of the system,” said Linthicum.  “The effectiveness of security depends wholly on the planning and technology applied to the problem, for both cloud and traditional systems.
Let’s get a clue and provide better security from the start, no matter where your systems are hosted.”

The simplest way for a business to protect their cloud hosted business data is to choose its hosting provider wisely.  Best practice is to deploy with a hoster that specializes in security and compliance with systematic security controls from their servers to their employee processes. Another benefit of outsourcing a hosting solution to a cloud security specialist is the ongoing service.  With updates worked into the service agreement, in-house IT doesn’t have to worry about maintenance and system updates.

By using a hosting provider to deploy cloud systems, CIOs and IT staff will have more time to focus on internal support and maintaining the security of those systems that remain on-premises.

When deploying ERP or accounting software in the cloud, it is also a good idea to choose a hosting provider that has experience with deploying ERP and 3rd party industry solutions on-premises and in the cloud.  This way the hoster is better equipped to work closely with in-house IT staff and VARs to deliver a highly secure solution.

No Comments

Post A Comment