10 Cloud Computing Security Tips for Small Businesses | www...

https://www.readability.com/articles/qxcofdee?legacy_bookmar...

smallbusinesscomputing.com

10 Cloud Computing Security Tips for Small Businesses by GERRY BLACKWELL • MARCH 8, 2011

For related articles, visit Internet.com's Cloud Computing site. Cloud computing can represent a net gain in datasecurity and system reliability – especially for small businesses with aging computers and data stored on hard drives that rarely -- if ever -experience a back up. But that doesn’t mean you can take security and reliability for granted. Protecting your company in the cloud requires careful due diligence and planning. Start here with these 10 cloudcomputing security tips.

1. Identify and Assign Value to Assets Assets could be include applications such as customer relationship management (CRM) or accounting; data, including private customer information; or infrastructure such as hosted servers and operating systems. The Cloud Security Alliance (CSA), an industry association set up to promote security inthecloud, recommends a structured, step-by-step approach to planning and managing cloud security, and this is where it starts. Ask yourself how valuable the assets that you’re considering moving to the cloud are to your organization, said CSA advisor Raj Samani, the London-based chief technology officer for security software vendor McAfee. What would happen if you couldn’t access online software for an hour or a day, for example, or the provider lost your data or hackers stole sensitive information from the providers’ computers? “Not all cloud providers are the same,” Samani noted. “If you assign a value to your assets, then it’s easier to decide what level of security you’re going to need.”

2. Assess Your Liabilities One of the biggest cloud security concerns is the risk of breaches resulting in loss or theft of

1 of 3

4/27/11 8:02 PM

10 Cloud Computing Security Tips for Small Businesses | www...

https://www.readability.com/articles/qxcofdee?legacy_bookmar...

sensitive private data. If the information leaked is proprietary only to your company, liability is not a concern. But you need to know where responsibility lies if customer or patient information goes missing. “If there’s a breach and data is lost, it’s not the cloud provider who is on the hook,” saed James Quin, lead analyst at Info-Tech Research Group Inc. “It’s the way all the regulatory bodies are coming down on this. You collected the data and chose how to store it. So you’re on the hook if something goes wrong.” In other words, caveat emptor -- let the buyer beware. And in this case, you’re the buyer.

3. Research Compliance Requirements In some industries -- banking and health care are examples -- government or industry regulations establish standards for how electronic data is handled, including stipulating the level of security in place. You may not even be permitted to use cloud services, or there may be restrictions, such as the data must be stored within the borders of your own country. “The number and type of security controls in place may well be defined by regulation,” Samani said. “If you’re processing credit card transactions, for example, you may need to comply with PCI-DSS standards. Long before you engage with potential providers, you need to build a list of regulatory requirements for security.” Even if nothing ever goes wrong security-wise, failing to comply with regulations can land you in hot water.

4. Determine Your Risk Tolerance These initial steps all play into this admittedly somewhat nebulous, but pivotal, next step. How much are you willing to risk, how much can you afford to risk -- given the liabilities, the regulatory requirements, the importance of the assets to your organization? “Based on the level of risk I’m willing to tolerate, do I, for example, have to look at a hybrid cloudsolution,” Samani said referring to a cloud implementation that involves some data or program logic remaining on your business premises. The other critical consideration is the cost of ensuring security, whether in the cloud or at your own offices. The more security controls you demand from cloud providers, the more expensive their services will be, Samani said. “But if we could give any advice to small businesses, it would be to not necessarily accept the

2 of 3

4/27/11 8:02 PM

10 Cloud Computing Security Tips for Small Businesses | www...

https://www.readability.com/articles/qxcofdee?legacy_bookmar...

lowest-cost solution,” he added. “Cost is not the only thing [to consider].”

Original URL: http://www.smallbusinesscomputing.com/biztools/article.php/3927376 /10-Cloud-Computing-Security-Tips-for-Small-Businesses.htm

3 of 3

4/27/11 8:02 PM

10 Cloud Computing Security Tips for Small Businesses | www ...

10 Cloud Computing Security Tips for Small Businesses | www.smallbusinesscomputing.com | Readability.pdf. 10 Cloud Computing Security Tips for Small ...

102KB Sizes 2 Downloads 231 Views

Recommend Documents

Small Business Guide to Cloud Computing | smallbiztrends.com ...
Small Business Guide to Cloud Computing | smallbiztrends.com | Readability.pdf. Small Business Guide to Cloud Computing | smallbiztrends.com | Readability.

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
important aspect of quality of service, Cloud. Computing inevitably poses ... also proposed distributed protocols [8]-[10] for ensuring storage .... Best practices for managing trust in private clouds ... information they're hosting on behalf of thei

privacy and security for cloud computing pdf
privacy and security for cloud computing pdf. privacy and security for cloud computing pdf. Open. Extract. Open with. Sign In. Main menu.

Data Storage Security Model for Cloud Computing
CDO's signature for later verification. SearchWord .... cryptographic primitives such as digital signature which can be used to authenticate the CDO/CDU by CSP.

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
Cloud computing provides unlimited infrastructure to store and ... service, paying instead for what they use. ... Due to this redundancy the data can be easily modified by unauthorized users which .... for application purposes, the user interacts.

Small and midsize businesses cloud trust study - Microsoft News Center
cloud trust study: U.K. study results. June 2013. FOR FURTHER INFORMATION, PLEASE CONTACT: Richard Saunders. Microsoft Trustworthy Computing.

Small and midsize businesses cloud trust study - Microsoft News Center
... Computing commissioned research, conducted by independent company ... enterprise resource planning, and compute capacity to run application code.

For Small Businesses QuickStart Guide
Books detail. Title : Download Taxes: For Small Businesses q ... get stuck, lost, or lose hope when trying to understand small business taxes. Never again will ...

Litigation on Small Businesses - Small Business Administration
Using online business directories, researchers ... Issues of intellectual property were mentioned by software and technology companies. Issues of ... large, but also the required infrastructure, human resources and accounting functions. A sole ...

Litigation on Small Businesses - Small Business Administration
Most companies used business assets to pay the damages. ... Issues of intellectual property were mentioned by software and technology companies. .... 10 Carol J. DeFrances et al., “Civil Justice Survey of State Courts, 1992: Contract Cases ...

Evolving Methods of Data Security in Cloud Computing - IJRIT
TPA makes task of client easy by verifying integrity of data stored on behalf of client. In cloud, there is support for data dynamics means clients can insert, delete or can update data so there should be security mechanism which ensure integrity for

Security and Interoperability in Cloud Computing and Their ... - IJRIT
online software applications, data storage and processing power. ... Interoperability is defined as Broadly speaking, interoperability can be defined ... Therefore, one of the solutions is to request required resources from a cloud IaaS provider.

Security and Interoperability in Cloud Computing and Their ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ..... which its role is a service management, data transmission, service brokerage ...

Security at Scale with Cloud Computing Services
can help you make smart architectural decisions of your own as you move forward. ... Increasingly, online storage and collaboration are important parts of office.

Study of Cloud Computing Security Based on Private ...
Abstract—Supporting study of a method to solve cloud computing security issue with private face recognition. The method has three parts: user part provides ...