BNMC Blog

The Cloud Isn’t Necessarily Safe

The Cloud Isn’t Necessarily Safe

The Cloud. That big, vague entity where a lot of us our entrusting our information has lifted a huge burden off of businesses by alleviating the need for expensive onsite hardware. It makes user management a little more user friendly. It keeps us connected and in communication no matter where we are.

It’s pretty great, right? With every silver lining, there is a darker, more dreary side. For cloud computing, it’s the fact that, like all technology, it is not inherently secure.

The Cloud is (Basically) Just Someone Else’s Computer

When you connect a computer to the Internet, you invite outside entities to try to infiltrate it. Viruses, malware, unpatched vulnerabilities, and other threats can creep onto an unprotected device and take over. This could lead to data theft or data loss. That’s why we all know to use antivirus and avoid using outdated software. That’s why we don’t install random software or visit sketchy websites. I’m pretty confident my reader base knows the drill here.

The cloud is essentially no different. It’s just a computer or an array of computers connected to the Internet. If it isn’t properly protected, it can be compromised. 

If you use Google’s G Suite platform and your email is handled through Gmail, and you are storing files in Google Drive, then you are simply using Google’s computers to do so. If you are using Microsoft 365, then you are storing your email and data on Microsoft’s computers.

*Side note, I miss being able to refer to anything related to Microsoft as belonging to Bill Gates. I’d love to be able to tell clients that they are using Bill Gates’ computers to store their Outlook. Maybe I just still haven’t come to terms with the fact that he stepped down from Microsoft back in 2006.

The point is, while we can typically trust these massive services to handle our data correctly, we still need to be aware that we are depending on them to do so.

On a smaller scale, you might use a local web hosting company, or you might pay to host a server at a smaller data center. The same applies - you are relying on this third-party to keep you safe.

My gut tells me to be skeptical whether I’m entrusting a major corporation like Microsoft or a small company with a data center, but at least with Microsoft I know that millions of others are using the service.

The Cloud Isn’t Always the Fast Path to Compliance

Complying to industry standards like PCI DSS, HIPAA, and the GDPR can be a big undertaking, especially for smaller businesses. Often, a nice big step towards compliance can be to rely on a third-party who focuses on hosted environments that meet those compliance regulations. This means that moving towards the cloud is often a win, but you need to read and understand the fine print before you simply pull the trigger.

For example, let’s say you are storing names and credit card numbers. You absolutely need to keep this data encrypted and control who has access. If your cloud host can get around that and employees can access the data, you might not fall under certain compliances. 

When it comes to protecting the data of your customers, there are a lot of moving parts and considerations, so spending a lot of time upfront and ensuring that your cloud solution can handle this, AND doing regular checks will have to become a way of life.

Like Anything Else, It’s Only as Secure as Its Weakest Link (Sorry, End Users)

Ever play Jenga, where you have to carefully pull blocks from a stack while trying to prevent the entire tower from falling over? Each time someone picks at it, there is a greater risk of the whole thing toppling down. The more hands that get involved means the more likely that things will go wrong faster.

Security is like that too. An end user could accidentally share a folder or set it to public. They could have a weak password, or use the same password on multiple sites. They could lose their mobile device and inadvertently give someone else access to everything.

Fortunately there are policies and settings around most of the obvious threats these days, but whether or not they are enforced is a whole other thing.

Who’s Responsible For Protecting My Cloud Hosted Data?

When it comes down to compliances, it’s really up to you. YOU have to protect the sensitive information of your employees, your customers, and your prospects.

That doesn’t mean you are alone. The IT security experts at BNMC can help audit your IT, whether it is onsite or in the cloud, and help you meet compliances. We take protecting the sensitive data of you, your staff, and your clients very seriously.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Business Computing Privacy Microsoft User Tips Software Network Security Google Malware Hackers Productivity Business Hosted Solutions Computer Communication Tech Term Internet Data Ransomware Small Business IT Services Mobile Devices Efficiency Cloud Computing Hardware Smartphone IT Support Data Recovery Workplace Tips Backup Innovation Saving Money Android Business Continuity Windows Office 365 Managed IT Services Microsoft Office Information Users Social Media Mobile Device Data Backup Windows 10 Data Management Upgrade Managed IT Services Internet of Things Browser App Cybersecurity Vulnerability Passwords Productivity Business Management Facebook Server Phishing Word Gmail Outsourced IT Windows 10 Disaster Recovery Encryption Remote Monitoring Miscellaneous Smartphones communications Chrome Artificial Intelligence Network Money IT Support Employer-Employee Relationship Tip of the week Save Money Website Virtual Reality Infrastructure VoIP Analytics Managed Service Managed Service Provider Gadgets BYOD Applications Risk Management Company Culture Robot Antivirus Paperless Office Office Tips Automation Google Drive Content Filtering Bandwidth Development Big Data Unified Threat Management Apps VPN Access Control Government Apple Employee-Employer Relationship IT Management Education Settings Maintenance Router Hacker Data storage Display YouTube Vendor Management Outlook Monitors Spam Two-factor Authentication Computing Bring Your Own Device Operating System Hard Disk Drive Chromebook Avoiding Downtime WiFi LiFi Augmented Reality Scam Managing Stress Hosted Solution End of Support Administration Laptop Mouse Networking The Internet of Things Data loss Telephone Systems Downtime desktop HIPAA SaaS Data Security Server Management Business Technology Storage Holiday Virtual Private Network Computers Virtualization Touchscreen Printing Collaboration Firewall Mobile Security OneNote Quick Tips Tablet Document Management Retail Alert Business Intelligence Solid State Drive Wireless Samsung Bluetooth Comparison Staff Leominster Slack Hard Disk Drives Private Cloud Firefox Superfish Identity Theft Modem FinTech Print Toner Office Language Value Messaging Tech Support Address Alt Codes Permissions Training Corporate Profile Regulations Content Scary Stories Entertainment Patch Management Managed IT Service G Suite Mirgation Recycling Digital Signage Data Warehouse User Error Running Cable Automobile IoT Social Engineering Specifications Budget Buisness Dell K-12 Schools Monitoring Solid State Drives Customer Relationship Management Social Cookies MSP Shortcuts Cabling Computing Infrastructure Professional Services Employee-Employer Relationships Websites Typing Humor Virtual Desktop WannaCry Social Networking Streaming Heating/Cooling Multi-Factor Security Information Technology Sports iOS Best Practice Break Fix Chatbots eWaste Troubleshooting Business Analysis Time Management Printer Current Events Google Maps Star Wars Safety Search Black Friday Wearable Technology Network upgrade Spying National Security Nanotechnology Security Cameras Alerts USB Analysis Students Emergency Cryptocurrency Motherboard Cables Human Error Remote Computing Servers Google Calendar Scalability Dark Web Google Docs Identity Continuity Network Congestion Network Management IT solutions Going Green Fraud Cost Management Cyber Monday Smart Office Updates Hacks Cybercrime Digital Payment Screen Reader Charging Managed Services Marketing Legislation Google Wallet Disaster Licensing Dongle Mixed Reality Wi-Fi Bitcoin Digital Wires Device Writing Migration Business Growth Microsoft Excel Solar LED SharePoint Assessment Managed IT Smart Technology Legal Work PowerPoint Dark Data Update Techology Password Smart Tech Laptops Statistics Unified Communications Drones Uninterrupted Power Supply Cooperation Service Level Agreement Data Breach How To Lenovo Windows 8 Spyware Voice over Internet Protocol Mobility Hotspot Internet Exlporer Politics Mail Merge Blockchain Computer Care IBM Compliance Co-Managed IT Downloads Halloween File Sharing Software as a Service Shortcut Deep Learning Distributed Denial of Service IT Technicians Optimization Onboarding GDPR Customer Service VoIP Unified Threat Management Mobile Device Management Connectivity Point of Sale Ben McDonald shares Health Black Market Travel Law Enforcement Mobile Computing Notifications Electronic Medical Records Supercomputer CrashOverride Motion Sickness Physical Security Staffing Twitter Upgrades Gadget Taxes Emoji Administrator Crowdsourcing Web Server what was your? IT Budget Personal Information Botnet GPS 3D Printing IT Consultant Printers Cortana Cameras Meetings Machine Learning Tracking BDR Processors Unsupported Software Cleaning CCTV Regulation Webcam Computer Repair Relocation Windows 7 Mobile Data How To Work/Life Balance Recovery Error

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3