Do you use Cloud Services? Know where your data actually sits?
Tue, 11/13/2012 - 10:06
Pretty much everyone uses a cloud service of some kind today whether it's for personal or corporate use. In fact, even cloud service providers themselves often use other cloud service providers to store data or host their services. This might not be apparent at first glance but it could mean you're trusting your data to several third parties and their storage facilities without knowing it. As such, if you're intending to integrate a cloud service into your corporate IT environment, it should be a top priority to find out as much as possible about where, how and by who your data might be stored under the service agreement.Your industry could have legal responsibilities to ensure the data you store doesn't cross borders. Similarly, it's likely you have the responsibility of ensuring a certain level of data security. Common requirements include, for example, that the data you store is encrypted at all times while offsite and that it cannot be accessed by unauthorized third parties.At Redstor, our cloud services are designed with these concerns in mind. Our online backup, backup for schools and cloud storage services for example, store data in 2 geographically disparate locations (Reading and Slough). The data we store never leaves the UK and data is encrypted before it leaves your network. It remains encrypted during transit and while it's stored on our platform. To ensure absolute security, only our customers have access to the encryption key, thereby ensuring that not even Redstor is able to read the data on our platform.The same amount of thought has gone into ensuring our other services such as secure cloud storage, remote asset and device management, e-safety safeguarding and laptop data protection are secure and suitable for organisations with stringent data storage requirements.If you're not sure you're meeting your legal requirements in terms of secure storage of data, give us a call on 0118 951 5200 or email us at [email protected].
The last 18-months has seen several cyber-attacks and cyber-crimes taking down critical networks and affecting organizations across the globe. As... read more
February 13, 2018