26 May 11. Eoin Blacklock, managing director, KeepItSafe®, a leading online backup provider and a brand of j2 Global® Communications, Inc., stated that the overwhelming problem with “cloud computing” is the lack of awareness as to where customer data is being stored. Customers should always know where it’s stored so they do not break any data protection rules and gain a better understanding of the cloud. Companies need to ask the following questions of their providers – Is the data stored in multiple datacentres. After hurricane Catriona many organisations all over the world who had hosted services “in the cloud” quickly learned that their data was actually stored in a datacentre in New Orleans which was now underwater. Just like the clouds in the sky, there are many different types and the fear in the industry is that not all providers will store the data in a secure environment and in multiple locations. With many companies now using applications which are external to their office network it has become much more security focused. Being able to access your files from anywhere and from any computer is one of the great conveniences of the always-on Internet. Online file storage has been around for quite a while, but the latest generation of services are so cheap and easy to use that there is almost no reason not to back some of your files up into the cloud. In 2010 many businesses saw their data grow to staggering levels therefore data storage options needed to fit this growing need. Simply put data is multiplying. Not only are businesses faced with future data growth, but saved data is also still of great importance especially in some industries. This is part of the reasoning behind the growing trend towards cloud computing. “The average data volumes being backed up are about 50GB per client, which is, in fact, a ten-fold increase from the 2005 level of 5GB” stated Eoin Blacklock, managing Director, KeepItSafe. So what are the security rules and what should you ask of your cloud computing supplier? It’s a balancing act – Trying to balance risk with the clouds convenience is the ongoing battle with cloud computing.
– Taking responsibility for cloud computing security is a huge area. There is a shared responsibility with your cloud provider for the security of your data; therefore it’s essential to conduct a thorough review of your provider’s security to ensure good governance, preferably against a proven standard such as ISO 27001. Providers prove their diligence in the area of security with such a standard – ask the question!
– Data Encryption – Many “cloud” providers of hosted email and hosted CRM do not encrypt the users data making it possible for the employees within the hosting company to view the information. This is preventing large corporations from using Cloud services such as hosted email.
– Data Replication – Where is the data being stored and mirrored. Eoin also stresses the importance of data being stored across multiple datacenters, again increasing security and reducing the effects of “natural disasters” on customer data.
– Compliance – Reduce the risk of security breaches by making sure your provider is compliant and has standards of practice.
– Awareness of vulnerabilities – The consumer needs to identify the hosted providers who are trustworthy and those who are not. Look for testimonials, certification, reference sites, and information of where the data is stored. Be informed and this will allow you to make an informed decision.
31 May 11. Jetico, developers of military-standard data protection software, has announced that their popular BestCrypt Container
Encryption software is now released for Mac users. Previously only available on Windows and Linux, Jetico’s proven file encryption software now offers full compatibility with Mac computers. “if a laptop containing confidential or personal information were to be stolen or accessed by an unauthorized person, BestCrypt offers peace of mind that an