5 Ways to Keep Mission-Critical Data Safe in the Cloud

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 5 Ways to Keep Mission-Critical Data Safe in the Cloud-6 Next

Protect the Keys to the Kingdom         

Nearly all cloud platforms are managed from a web-based portal. The most security conscious providers require two-factor authentication to the cloud portal. This limits the eternal risk of shared passwords and brute force attacks on password databases. Even complex passwords can be vulnerable with careless end users. The risk of a compromised portal was amply illustrated by the attack that forced Code Spaces out of business last summer. Ensure that your providers protect your assets with two-factor authentication to the portal.

Before any company moves to the cloud, an inevitable question is asked: Will our data be secure? A 2014 IBM study found that while 85 percent of chief information security officers (CISOs) believe their company's move to the cloud is imminent, more than 40 percent also believe a significant security breach will happen at a major cloud provider. 

As businesses shift their mission-critical workloads to the cloud, IT departments are tasked with not only managing company data, but also securing it. Choosing a cloud service provider that fits your security strategy is key. IT Business Edge recently spoke with Sean Jennings, co-founder and SVP of solutions architecture at Virtustream, who shared five cloud security and compliance tips for IT leaders as they transition their companies to the cloud.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.