• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE UPDATE

June 1, 2011 by

26 May 11. Eoin Blacklock, managing director, KeepItSafe®, a leading online backup provider and a brand of j2 Global® Communications, Inc., stated that the overwhelming problem with “cloud computing” is the lack of awareness as to where customer data is being stored. Customers should always know where it’s stored so they do not break any data protection rules and gain a better understanding of the cloud. Companies need to ask the following questions of their providers – Is the data stored in multiple datacentres. After hurricane Catriona many organisations all over the world who had hosted services “in the cloud” quickly learned that their data was actually stored in a datacentre in New Orleans which was now underwater. Just like the clouds in the sky, there are many different types and the fear in the industry is that not all providers will store the data in a secure environment and in multiple locations. With many companies now using applications which are external to their office network it has become much more security focused. Being able to access your files from anywhere and from any computer is one of the great conveniences of the always-on Internet. Online file storage has been around for quite a while, but the latest generation of services are so cheap and easy to use that there is almost no reason not to back some of your files up into the cloud. In 2010 many businesses saw their data grow to staggering levels therefore data storage options needed to fit this growing need. Simply put data is multiplying. Not only are businesses faced with future data growth, but saved data is also still of great importance especially in some industries. This is part of the reasoning behind the growing trend towards cloud computing. “The average data volumes being backed up are about 50GB per client, which is, in fact, a ten-fold increase from the 2005 level of 5GB” stated Eoin Blacklock, managing Director, KeepItSafe. So what are the security rules and what should you ask of your cloud computing supplier? It’s a balancing act – Trying to balance risk with the clouds convenience is the ongoing battle with cloud computing.
– Taking responsibility for cloud computing security is a huge area. There is a shared responsibility with your cloud provider for the security of your data; therefore it’s essential to conduct a thorough review of your provider’s security to ensure good governance, preferably against a proven standard such as ISO 27001. Providers prove their diligence in the area of security with such a standard – ask the question!
– Data Encryption – Many “cloud” providers of hosted email and hosted CRM do not encrypt the users data making it possible for the employees within the hosting company to view the information. This is preventing large corporations from using Cloud services such as hosted email.
– Data Replication – Where is the data being stored and mirrored. Eoin also stresses the importance of data being stored across multiple datacenters, again increasing security and reducing the effects of “natural disasters” on customer data.
– Compliance – Reduce the risk of security breaches by making sure your provider is compliant and has standards of practice.
– Awareness of vulnerabilities – The consumer needs to identify the hosted providers who are trustworthy and those who are not. Look for testimonials, certification, reference sites, and information of where the data is stored. Be informed and this will allow you to make an informed decision.

31 May 11. Jetico, developers of military-standard data protection software, has announced that their popular BestCrypt Container
Encryption software is now released for Mac users. Previously only available on Windows and Linux, Jetico’s proven file encryption software now offers full compatibility with Mac computers. “if a laptop containing confidential or personal information were to be stolen or accessed by an unauthorized person, BestCrypt offers peace of mind that an

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
  • GoExporting logo
  • Supercat logo
  • Galvion logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • VETERANS UPDATE

    May 30, 2023
    Read more
  • PARLIAMENTARY QUESTIONS

    May 26, 2023
    Read more
  • EXHIBITIONS AND CONFERENCES

    May 26, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT