The cloud has been central to the business workings of organisations. Reliance on the cloud as a central storage tool highlights the importance of security. With important data and documents and sensitive information stored away on the cloud, there is too much at stake. Intense effort and investment needs to be put into making sure cloud providers are providing these five main security features.
There are two sides to the cloud coin: one positive, the other negative, and too many people focus on one at the expense of the other for a variety of reasons ranging from ignorance to wilful misdirection. But ultimately, success resides in embracing both sides and pulling together the capabilities of both enterprises and their suppliers to make the most of the positive and limit the negative.
Microsoft Azure has been hit by yet another global outage, this time impacting even its own online Office services and websites. The outage raises serious questions about whether these kinds of public cloud platforms are ready for mission-critical workloads.
Social networking giant Facebook is looking to get into the business networking and collaboration game, according to unnamed sources in an FT report. It would apparently take the form of a dedicated zone, called ‘Facebook at Work’, that would have familiar Facebook functionality, but shield your work contacts from any frivolous content posted in the personal section.
It goes without saying that there has been an increasing shift towards remote working in the past few years. Whether this is recession driven, or businesses are just becoming more flexible as technology moves on, there is no doubt that remote working has grown – and with it the demand for an ever more secure cloud-based software solution. Cloud software allows businesses agility, whilst lowering costs, but businesses need to know that their access is secure. The question is: Public or Private Cloud?
Recent news stories of the leaking of highly personal photos of a number of celebrities have caught a lot of people by surprise and everyone should be ensuring that their personal data is safe, regardless of what type of data or who they are. The technical details of the hack has not been made clear, however, it is highly likely that photos were extracted from cloud servers.
The growing use of Cloud technology in business is nothing short of phenomenal. The reason for this is that it saves on time, cost and enables flexible working. Despite these benefits, I find that many charities are still resisting its adoption. Recent research by Technology Trust found that, of 426 respondents, 58 per cent of charities still don’t use the cloud – 65.1 per cent of which are small charities. With the array of articles written about the benefits of the cloud, I wanted to know why.
First we had BYOD (Bring Your Own Devices) – now hot on its heels is WYOD (Wear Your Own Devices). If there is a lesson to be learnt for enterprises it is that the consumerisaton of technology has crept up on them and created some major challenges in terms of network management, security and best practice.
For years now there has been talk of how business is driving IT to move to cloud. In many cases, business teams go so far as to circumvent IT and buy cloud services themselves, taking decisions into their own hands. Much has also been written about why IT should eagerly accept this imperative and embrace the use of cloud. In reality, however, managing a cloud footprint is much harder and more specialised than many imagine.