As more and more businesses shift their data storage to cloud-based facilities, so the conversation about cloud security begins to heat up. While some believe that cloud is far safer than on-premise, others are contesting quite the opposite. It is therefore important to know the basic facts before making a decision on where to keep your data – be it your own personal information or your company’s entire library.
- The cloud security market is growing
Whether we like it or not, the cloud market is continuing to expand at a rapid rate, and so is the demand for cloud security. This bodes well for the advancement of security measures and strategies being made available to cloud users. It is predicted that the cloud security market will hit $9 billion by 2019.
- Strategy is key
As with any IT solution, the only real way to keep data as secure as possible is by having a comprehensive strategy. It is no use relying solely on providers to do all the legwork if the inhouse security is not up to scratch.
- Hackers see cloud as a resource, not a target
One particularly unnerving thing that was revealed during the attack on Sony was hackers’ ability to utilise the cloud as a resource by renting out servers to launch their assault. There is also the likelihood that more hackers will start to target the cloud itself so as to access large volumes of data in one fell swoop.
- Storage is perceived as the riskiest cloud app
The cloud is best known for its storage and backup facilities, which are used by the cloud security industry itself. More than 50% of respondents to the Cloud Security Alliance’s Cloud Usage: Risks and Opportunities Report listed storage as the most risky cloud application. Finance and accounting apps came in second.
- Controlling adoption is difficult
Cloud adoption simply means the gradual transference of data to cloud based services. With more people now bringing their own devices into work, as well as using their own applications, organisations are struggling to keep tabs on where things are being stored and accessed. IT leaders rarely get the chance to fully assess security before a service is adopted by users.