Connect with us

Hi, what are you looking for?

Web

Protecting Cloud Data

Cloud computing sample architecture
Image via Wikipedia

Cloud computing involves the use of servers that are located far away (in clouds) for storing and managing data. It is fast becoming a very popular technology being employed by several multi-national corporations such as Yahoo, FileDen and Flick, today. This is because several organisations that have large data capacity now want to be able to store and manage their data with cheaper, smaller and much more efficient processors that consume less energy than standard systems in traditional settings.

Unfortunately, every new technology comes with new challenges, many of which involve problems that are associated with privacy and security. Cloud computing is not exempted from these challenges particularly when it comes to proper data handling.

While looking for cheap cloud computers in cyberspace, many organisations stand the risk of ignoring basic checks that can result in cloud data falling into the wrong hands. Such mistakes can be easily avoided by performing simple checks to confirm whether the outsourcing companies have protective measures, such as firewalls and powerful anti-virus software that can protect stored data on premises, in place. Furthermore, before outsourcing data one should ensure that there is a plan B in place by designating a local back-up or paying for a second provider. While this might be expensive, it could also be worthwhile in the long run.

Talking Point

Should organisations that use cloud computing be obliged to provide information on security measures that have been undertaken to their customers so as to alleviate privacy concerns?

Written By

Thanks for reading this article. If you're new here, why don't you subscribe for regular updates via RSS feed or via email. You can also subscribe by following @techsling on Twitter or becoming our fan on Facebook. Thanks for visiting!

5 Comments

5 Comments

  1. Pingback: Tweets that mention Protecting Cloud Data

  2. Domain name registration

    July 19, 2010 at 7:08 am

    Nice, advice, it very important to checks and confirm that outsourcing company have protective measures and backup it place. It is also a goo idea for you to make arrangement for a backup as well.

  3. chair cover hire

    July 21, 2010 at 10:19 am

    Safety measures should be the first thing to consider online. That’s something to ponder.

  4. Nick

    May 24, 2011 at 1:09 am

    People move to cloud computing for the convenience and the cost savings. While everyone should take responsibility for the security and privacy of their own data, it is important for cloud service providers to make it clear just how much responsibility they take with their clients’ information

  5. Jim Olenbush

    August 13, 2011 at 8:41 am

    Organizations that use cloud computing definitely need to be transparent on how they exactly go about protecting customer data. Cloud computing has not yet become mainstream yet and there are definitely some loop holes that needed to be patched. It’s up to the customer if they are willing to trust their personal information to organizations that use cloud computing technology.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You May Also Like

Tech

In recent years, the finance sector has witnessed a significant transformation in its approach to data management and security, largely driven by the adoption...

Tech

Remember, when standing up a Fresh database case involved Mimicking the Application Using the database to Ascertain which hardware (storage, Host, etc… ) Was...

Tech

Seeking ways to reduce Cloud waste and costs? If yes, consulting with an offshore Cloud-based services provider is a strategic decision. These experts ensure...

Tech

In today’s cloud-native landscape, agility, scalability, and resilience are paramount, where microservices architecture has emerged as a cornerstone for building modern applications. By breaking...