Fear of Loss of Control Holding Back Cloud Take-Up

Fear of Loss of Control Holding Back Cloud Take-Up

posted in Product ● 26 Jun 2015

There are a number of reasons why take-up of cloud computing models including hybrid cloud could be restricted, according to the Cloud Industry Forum (CIF), including perceived lack of control, privacy and security.

The organisation came to this conclusion after surveying senior IT heads in both public and private sectors, finding that while 24 per cent of those asked back in 2014 said they were worried about losing manageability and control of their IT systems, 40 per cent have such concerns now.

In addition, 70 per cent of survey respondents stated that data security was their biggest concern with regards to moving to the cloud, while 61 per cent said the same about data privacy. This compares to the 61 per cent and 54 per cent that respectively said the same last year.

In Redstor’s experience and from a security and privacy perspective, this lack of trust is driven in large part by prominent news stories regarding cloud service data breaches. Last year, the profile, size and number of data breaches expanded hugely.

However, it’s important to remember that the vast majority of data breaches relate to consumer-focused services, where hackers are trying to gain access to credit cards and other personal information they can use to spam, commit fraud, etc.

It’s pretty rare for a B2B cloud services to be breached and the data taken is often encrypted anyway but the trend is hard to ignore nonetheless. Organisations considering cloud services can have their fears assuaged by utilising services that feature strong end-to-end encryption, that store data at rest in an encrypted format and that give them, the end user, control over the encryption key. By doing this, they ensure that even should the provider be hacked, the only information available to hackers is still masked using strong encryption.

In terms of lack of control, inspecting the T&Cs closely is vital. Cloud providers that are transparent and accountable will have an exit clause in their terms and conditions which outlines how relevant data will be returned to a customer at the end of a contract before being permanently deleted from the provider’s platform. In addition, many reputable providers will offer assistance in the form of migrating data to another system needed.

Rise in laptop sales leads to data protection worries

Reading, 6 April 2020 – An unwelcome repercussion of employees snapping up laptops for home working ahead of the coronavirus lockdown has been an even bigger spike in cyber-criminal activity.

Continue reading

O365 cyber attacks stress need for isolated backup

Reading, 17 December 2019 – Office 365 is a prime target for cyber criminals – and it’s not difficult to understand why when Microsoft announced this year that it has more than 180m active commercial users every month.

Continue reading

Redstor to showcase pioneering data management technology at Infosecurity

Reading, 26 July 2019 – Redstor, the UK-headquartered company disrupting the world of data management, is pushing ahead with aggressive expansion plans in the Netherlands.

Continue reading