The rise of the digital economy, unexpected market events, and the growing need for business resilience has only served to accelerate the influence of the cloud on infrastructure.Continue reading
Please give us a few moments whilst we get your account ready.
There are a number of reasons why take-up of cloud computing models including hybrid cloud could be restricted, according to the Cloud Industry Forum (CIF), including perceived lack of control, privacy and security.
The organisation came to this conclusion after surveying senior IT heads in both public and private sectors, finding that while 24 per cent of those asked back in 2014 said they were worried about losing manageability and control of their IT systems, 40 per cent have such concerns now.
In addition, 70 per cent of survey respondents stated that data security was their biggest concern with regards to moving to the cloud, while 61 per cent said the same about data privacy. This compares to the 61 per cent and 54 per cent that respectively said the same last year.
In Redstor’s experience and from a security and privacy perspective, this lack of trust is driven in large part by prominent news stories regarding cloud service data breaches. Last year, the profile, size and number of data breaches expanded hugely.
However, it’s important to remember that the vast majority of data breaches relate to consumer-focused services, where hackers are trying to gain access to credit cards and other personal information they can use to spam, commit fraud, etc.
It’s pretty rare for a B2B cloud services to be breached and the data taken is often encrypted anyway but the trend is hard to ignore nonetheless. Organisations considering cloud services can have their fears assuaged by utilising services that feature strong end-to-end encryption, that store data at rest in an encrypted format and that give them, the end user, control over the encryption key. By doing this, they ensure that even should the provider be hacked, the only information available to hackers is still masked using strong encryption.
In terms of lack of control, inspecting the T&Cs closely is vital. Cloud providers that are transparent and accountable will have an exit clause in their terms and conditions which outlines how relevant data will be returned to a customer at the end of a contract before being permanently deleted from the provider’s platform. In addition, many reputable providers will offer assistance in the form of migrating data to another system needed.
Kubernetes data protection represents a massive opportunity. Around 30% of global organizations are currently running containerised applications in production – by 2022, Gartner predicts that figure will be as high as 75%.Continue reading
Reading, 6 April 2020 – An unwelcome repercussion of employees snapping up laptops for home working ahead of the coronavirus lockdown has been an even bigger spike in cyber-criminal activity.Continue reading