Cloud Security Tips for Small and Mid-sized Organizations
Melissa Stevens 270005B76W MELISSAS@US.IBM.COM | | Tags:  cloud-security security ibmsecurity
0 Comments | 3,308 Visits
This post is courtesy of Ronnie Shelley, IAM Segment Manager for IBM Security.
Organizations of all sizes are facing the same dilemma today. The online tools and applications you use to open up communications with customers, enable a mobile workforce, and promote your offerings are the same ones used by cybercriminals to hack your web applications and steal your data. While large firms can combat these external threats by investing in robust security solutions and hiring the needed staff to manage them, it’s not as easy for the small organization with limited resources.
If you want to improve security without taking on the associated overhead, you may want to consider subscribing to Infrastructure as a Service or Software as a Service (SaaS) from third-party providers. Subscribing to a cloud-based service, rather than pur¬chasing the hardware and software licenses required to run the technology in-house, can be a real boon to small and mid-sized organizations. They benefit from on-demand scalability, pay-per-use pricing, and relief from capital expenses for hardware purchases.
Cloud computing can provide a net gain in data security and system. The best cloud providers are usually well staffed and trained, with top-notch IT and security solutions at their fingertips. By offloading the management of some of your infrastructure to these providers, you’ll get access to advanced security solutions you may not be able to afford and manage on your own. You can focus on doing your business and let the cloud provider handle the security issues. In so doing, you could benefit from higher levels of protection and maybe an improved bottom line.
Yet, despite the clear benefits of cloud computing, protecting proprietary data and critical workloads remains a concern for organizations. These concerns can be resolved by choosing a provider with a solid, documented approach to safeguarding your data and applications. Questions to ask a potential cloud provider include:
These questions are not just academic. In all cases, even when using a third-party for hosting or cloud computing, the ultimate responsibility for protecting your company’s data falls on you – legally and in the eyes of the market. First, determine which workloads you’re comfortable placing in the cloud, and then be sure to select a cloud provider that has a strong history of providing secure hosting services. It is possible to improve security in the cloud. Visit the IBM Cloud Security Web site for more information.