(703) 860-6945

Data Security: 5 Things Public Cloud Providers Do (That Your IT Department Probably Doesn’t)

Data Security: 5 Things Public Cloud Providers Do (That Your IT Department Probably Doesn’t)

Cloud Data SecurityIn the words of Gordon Gekko, “The most valuable commodity I know of is information.” How true that is. But what happens when someone else, be it Sergei from Eastern Europe, Huang from China, or Bob, your disgruntled IT worker wants some of that information for himself?

Data security is a hot topic in the industry today, and protecting that information is atop the list of concerns among executives in finance and technology today.

In a recent study, Wall Street Journal amassed a CIO Task Force to name the top five concerns among organizations, and three of the five revolved around minimizing risk.

Four Companies with Two Things in Common

Yet many organizations looking for security think that the safest place to put information is on-premise.

Consider the following companies—what do they have in common?

  • Target
  • Sony
  • Home Depot
  • JP Morgan Chase

If you said, “all of these breaches occurred as a result of hackers infiltrating on-premise software,” you’d be correct. For a few more recent data breaches of all types, check out this interactive data breach infographic on Information is Beautiful.

Five Questions to Ask About Your In-House Data Security

Oh well, we could go on and on (and we have). But we’d like to share with you a few questions posed by our friends at Host Analytics about security in the average mid-market data center:

  • Do you have security guards at your facility 24X7?
  • Do you have silent and audible alarms and cameras at all entrance and access points?
  • Do you have a retina or fingerprint scanner and badge reader on your server room so that unauthorized people can’t steal a badge and access your server?
  • Do you pay third-party “white hat” hackers to regularly attempt to hack your application?
  • Are you planning to pay for regular SSAE audits to ensure your team has the proper controls in place and rigorously and continuously adheres to them?

For a bit more information, see the full blog, including the complexity of patching—even for world class IT organizations.

It’s Literally Organizational Life or Death for Vendors

Any vendor that is going to provide a cloud offering is going to go to great lengths to protect data, because there are no second chances.

That’s why we choose to companies like Host Analytics and Intacct, because we care about our customers, their data, and their satisfaction.

Essentially, it all comes down to trust.

That’s why we recommend, regardless of whether you choose products sold by Brittenford, that you read through the Skyhigh Enterprise-Ready™ Cloud Services list and report.

Skyhigh evaluates thousands of cloud services and presents the Skyhigh Enterprise-Ready™ seal to only those services that have the highest CloudTrust™ rating possible. Only 93 services have earned Skyhigh’s CloudTrust™ rating of Skyhigh Enterprise-Ready™ based on their attributes across the data, user and device, security, business, and legal evaluation categories.

Two of those, Intacct and Host Analytics, are sold, implemented, and serviced by Brittenford Systems. See how we can help you improve your financials and know that your information is secure. Contact us today.

Related Resources

0 Comments

Leave a reply

Your email address will not be published. Required fields are marked *

*