It’s critical to secure your company data and systems to protect them from ever-present cyber-thieves. With more data continuing to move to the cloud, those services become attractive targets and attacks will increase. Here are four security best practices for cloud hosting to follow in order to help ensure your important information is protected, including how to augment your data center service provider’s security and how to evaluate their security controls.
Many data centers advertise themselves as a specific Tier, based on a scale from I – IV. But these classes are generally poorly defined and in many cases misused. Case in point: Green House Data recently exhibited at an industry event in Denver. A man walked up to the table and started asking about the company’s data centers. “You guys are up in Cheyenne, right?” he said, “What kind of facility? Tier II? Tier III?”
Your business may already be using some cloud-based applications, such as Salesforce.com or Dropbox, and maybe you’re contemplating moving even more of your infrastructure to the cloud. There are definite benefits of a cloud-based infrastructure including flexibility, guaranteed performance SLAs, regulatory compliance, shifting CapEx costs to the OpEx budget, and, depending on what type of data center service provider you choose, a greener footprint. Here are five positive aspects of making the cloud your primary technology infrastructure.
Although IT executives like the benefits of hybrid clouds, they also have concerns about application and data security. IDG Research found 47% of IT executives are considering investing in hybrid clouds, because they can scale up or down quickly based on bandwidth needs. However, they’re also very concerned about hybrid cloud security issues like data loss or leakage (78%), insecure interfaces and APIs (77%), and account or service hijacking (76%) .
To get an insider’s view about these issues, we interviewed Cortney Thompson, Green House Data Chief Technical Officer for his thoughts.
We frequently talk about HIPAA compliance and how that affects healthcare organizations as they migrate to cloud-based infrastructure. This infographic gives some more details about what electronic health records are used for, what patients want from ePHI, the most common types of breaches and ways to secure health data.