Security Fears Still Inhibiting Cloud Adoption in 2016

Full cloud connectivity and operation has long been the dream for many businesses all around the world, securely storing their data and information in a remote location. Not only does this technology simplify the organisation of all data and docs, but can reduce the physical footprint of the business – a great potential money saver.

However it appears that question marks over the security of the technology is still inhibiting widespread adoption, with decision makers from many different industries deeming the cloud too insecure to be 100% robust and reliable. This is despite the technology entering into maturation, and being present throughout many industries.

In a report released earlier this year, drawing input from 270 security, software and networking specialists, there were 12 main areas of concern regarding the security of cloud technology:

• Data breaches
• Weak identity, credential and access management
• Insecure APIs
• System and application vulnerabilities
• Account hijacking
• Malicious insiders
• Advanced Persistent Threats (APTs)
• Data loss
• Abuse and nefarious use of cloud services
• Denial of Service
• Shared technology issues

The Cloud Security Alliance has moved to allay these fears, suggesting that any security breaches are more likely the fault of a poorly executed moved onto the cloud, rather than the platform itself. In a press release, CSA executive vice president of research, J.R. explained:

“The 2016 Top Threats release mirrors the shifting ramifications of poor cloud computing decisions up through the managerial ranks. Instead of being an IT issue, cloud security is now a boardroom issue. The reasons may lie with the maturation of cloud, but more importantly, higher strategic decisions are being made by executives when it comes to cloud adoption.”

And all the major cloud service providers have recognised this hurdle when convincing potential customers to convert to the technology – implementing one of two processes to providing high levels of security: reactive and proactive.

The reactive approach incorporates the implementation of a 24/7 management and customer services team to respond immediately to any threats or potential data breaches, whilst the proactive approach involves the installation of appropriately robust security measures from the off.

When implementing new applications or web-based software from scratch, there is a large number of benefits to being ‘born in the cloud’, not least the efficient practices it affords. However it is important that this process is managed by an experienced team who help you receive all the benefits whilst remaining secure.

Sign up for our blog

24/03/2016

Shield Safety Group

Blogs, Our story

Latest insights

21 hours | 3 mins
Continuous Improvement: Why Trust Is The Bedrock Of Excellence In Hospitality

In the hospitality industry, nothing is static. New innovations are always emerging, customer expectations evolving, […]

Read post
4 weeks | 3 mins
From Risk to Re-assurance: 5 Tips For Transforming Your Business’ Allergy Policy

When you work in the hospitality industry, ensuring the safety of every guest is paramount […]

Read post
4 weeks | 2 mins
Essential Safety Tips for Managing Allergies

Allergies affect millions worldwide, impacting people of all ages and backgrounds. In the UK alone, […]

Read post

Keep in touch