Cloud security requires combined efforts, technologies
June 13, 2013Grazed from ProofPoint. Author: Editorial Staff.
Cloud computing has become increasingly popular for businesses in a range of sectors. These technologies can offer a variety of benefits that promote efficiency while minimizing costs for a considerable competitive edge. However, storing sensitive information in a cloud environment opens up new risks that need to be addressed to prevent a potential breach or attack. With staff support and the right combination of technologies, companies can enjoy the flexibility and agility that comes with cloud computing without the associated threats to data protection.
Business 2 Community contributor Lindsey LaManna explained that no cookie-cutter security plan can address the unique vulnerabilities and goals within an organization. The most successful strategies, she asserted, are aligned with all departments’ long-term objectives, and consider every potential threat. She also stressed that it is critical to develop an optimal risk management program to support those goals, regardless of where data is stored. This program, she noted, should be realistic, consistent and centrally developed to minimize overall susceptibilities and offer a holistic view of the risk landscape. Next, LaManna revealed that companies need to align goals with measurable results, such as a specified decrease amount of security incidents and further, make cloud providers aware of them…
Unified commitment
LaManna was adamant that businesses need to ensure that the entire organization is fully aware of the security program. This is critical, considering the rising popularity of bring-your-own-device (BYOD) policies, which have made it easy for employees to access corporate data on personal smartphones and tablets. By establishing reasonable policies and procedures and making these practices well-known enterprise-wide, companies can further strengthen all efforts. After these guidelines have been set, LaManna advised continually reviewing the security plan to identify any areas that could be improved. Further, companies should monitor and report results of the program on an ongoing basis and audit compliance to the policies previously defined…
Read more from the source @ http://www.proofpoint.com/about-us/security-compliance-and-cloud-news/articles/cloud-security-requires-combined-efforts-technologies-447338


