Costin RaiuCostin Raiu


Is data in the cloud as vulnerable as the industry seems to think?

Although cloud computing has had a significant impact on information in general, it is unfair to assume data stored in the cloud is inherently insecure.

According to , global research and analysis team director at " rel=tag>Kaspersky Lab, very often, when it comes to cloud technologies, the major concern of many businesses is whether it is more dangerous or not to store data in the cloud or on a physical server. “Just because information is hosted on a company’s own servers does not mean it is better protected than if it was stored in the cloud. Despite all the obvious risks, it shouldn’t be presumed that data that ends up in the cloud suddenly becomes accessible to someone else. It is not uncommon for data stored in the cloud to be protected better than if it were stored inside a company.”

That said, the emergence of cloud computing has had an undeniable impact on data - although not necessarily more so than it has on any other area of IT.

“Essentially, everything and everyone is connected in a digital world that’s only about 20 years old and growing at such a rapid rate, making it increasingly difficult for our human minds to understand sufficiently how to secure our assets from threats,” says , HP’s country manager. “Nothing connected is safe! Cloud shifts an entity such as a user, device or information asset, which previously had a geographic location, into a virtual location somewhere into the fussiness of the Internet.”

, MD of Magix Security explains, “The arrival of ‘the cloud’ and ever-increasing consumerisation of IT has provided end-users the ability to drive technologies that are neither understood nor managed by their internal IT staff, immediately increasing the complexity and associated risk.”

According to -Young" rel=tag>Simon Campbell-Young, CEO of Phoenix Software, if you are visible on the Web, then you are potentially scammable. “The greatest risk to corporate networks at the moment comes from infections distributed via social networks,” he says. “The behaviour of people using social media is like their behaviour using e-mail 10 years ago. With e-mail, we’ve learned to never click on anything. But inside social media, people click on every tiny URL because they trust the sender. That’s why botnets that were successfully rebuffed five years ago are now coming back via social media.”

INEVITABLE CHANGE

As Raiu states, “It is not a case of traditional solutions not being sufficient anymore, but rather the fact that the needs of a business have changed and as such, a business must invest in solutions that meet their particular needs, especially when we consider trends such as cloud, virtualisation and mobility – a traditional solution has not been developed with such trends in mind.”

Furthermore, he adds, cyber criminal activity remains rife globally; where is seeing 125 000 unique samples appear per day.

Campbell-Young says modern has become so pervasive and so adept at hiding within corporate networks, that according to a Computer Security Institute survey, four out of 10 organisations experienced an incident such as a infection, botnet, or targeted attack in 2011 - and another 10% didn’t know if their networks had been breached. According to Juniper Networks, he says, over six million unique samples were identified in the first quarter of 2011, a 26% increase from Q1 of 2010 and far exceeding any first quarter in history.

“And to make matters worse, is not the only risk factor on social networks. Nearly one out of four organisations in the US has lost sensitive data when employees spilled the beans online – and South Africa is following hot on America’s heels.”

, sales director of EMEA, LATAM and Australia for AVG, ascertains, “Malware forms aren’t changing much, but the means of delivering it, and its intent, is becoming more stealthy and sinister. The itself has little need to change because the underlying platforms are still the same, but the cyber criminals that are responsible for these infections are going to be using new vulnerabilities to blast their way in and do the damage they’re designing it to do.”

He advises businesses of all sizes should treat online the same way they treat corporate governance and brand protection - and to make it a boardroom issue. “This is not just a technology debate,” he stresses. Brindley believes it is best to incorporate the strategy into the business strategy from day zero in order to effectively defend it against loss - whether it be loss of revenue, litigation, intellectual property, customer data or reputation.

“A smart approach is to start with the assumption your network has already been compromised and design around that,” Campbell-Young concludes.