Article

Is Your Cloud Provider Sidestepping Security?

Topic: Identity TheftBy Dovell BonnettPublished Recently added

Legacy signals

Legacy popularity: 948 legacy views

When you accept that cloud provider’s contract to store or backup your company’s data on their servers, did you read the fine print? According to Gartner, 2012 may be the year that Cloud Services gets a big boost because companies are looking to decrease IT costs, have more access form remote users and offer more services to your customers. But, at what cost?

In the April 2011 “Security of Cloud Computing Providers Study” white paper by the Ponemon Institute three very disturbing conclusions were made. One, cloud providers do not view security as a competitive advantage. Two, they don’t view security as an important responsibility. And three, cloud providers believe it is their customer’s responsibility to secure the cloud and not theirs. This is very evident when you look over the top leading cloud providers (Amazon, Google, and Microsoft ) contracts.

• From Amazon: “Amazon has no liability for …. (D) any unauthorized access to, alteration of, or the deletion, destruction, damage, loss or failure to store any of your content or other data.”
• From Google: “Customer will indemnify, defend, and hold harmless Google from and against all liabilities, damages, and costs (including settlement costs and reasonable atto
eys’ fees) arising out of a third-party claim: (i) regarding Customer Data…”
• From Microsoft: “Microsoft will not be liable for any loss that you may incur as a result of someone else using your password or account, either with or without your knowledge. However, you could be held liable for losses incurred by Microsoft or another party due to someone else using your account or password.”

Where this ends up biting a company is when a security breach does occur since they are still liable for all of their customer’s personal information. So the defense of offloaded IT services to a third-party has no validity. And in fact may create an even bigger problem for the company when fines and lawsuits are ascertained because it looks like you are not interested in your customer’s well-being.

Cloud computing is by all means not going away. There are many advantages to cloud computing to companies of all sizes that needs to be properly integrated into the company’s business plan. But what cannot happen is for companies to feel that they are no longer responsible or liable for the information they hold about their customers.

So to think that you’re going to reduce your IT costs and staff by moving to a cloud-based architecture is foolish at best. If anything you’re going to need more IT resources to be able to pick out the leaders within the industry, what services will be implemented and how security is being maintained to protect the company.

In Conclusion

The best advice I can offer any company who is interested in adopting a cloud strategy is to 1) Don’t put sensitive information onto any third party cloud; 2) consider building a private cloud; and 3) higher IT specialists who will manage and monitor all the cloud activities.

Article author

About the Author

Founded in 2005 and headquartered in Ladera Ranch, Califo
ia, Access Smart is dedicated to empowering businesses and consumers to securely regain control over their digital information. Access Smart offers unique, high-quality, integrated hardware and software packages that securely manage important data over wired and wireless networks, computers, Point-of-Sale devices, kiosks, and any other device that can accept and communicate via smartcard technology.

Security does not have to be cumbersome to be affective. That is why our products are designed using state-of-the-art security technologies but focuses on ease of use. Access Smart provides affordable smart card security solutions that have previously been available only to governments and Fortune 500 companies. Security should never be a luxury especially with rampant identity theft and privacy regulations.

The Access Smart team has over 50 combined years in the smartcard and security industry. By addressing the very real problems technology users experience every day, we develop smart card products that are convenient, affordable and easy to use.

Further reading

Further Reading

4 total

Article

It is probably no surprise to most adults that identity theft is one of the fastest growing types of fraud. But what may be more alarming is that people in the 18 to 29 age range are the fastest growing group of victims. One need not look too far to figure out why. Today’s young people ...

Related piece

Article

On a daily basis, consumers are barraged by offerings from companies claiming they can turn their dismal credit histories around and help them achieve higher credit scores. For a fee, they promise to clean up a consumer’s credit report so they can obtain a car loan, a home mortgage or ...

Related piece

Article

The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have.

Related piece

Article

Dealing with a collection agency can be a stressful experience. Not only are some debt collectors rude, but endless demanding telephone calls and letters can shake even the toughest individual. The stress and confusion that debt collectors can cause often results in consumers making mistakes that can result in future financial or legal difficulties. Here are 5 mistakes to avoid when dealing with a debt collector; 1. Conducting Business over the Telephoner

Related piece