5 Common 'Cloud' Myths

2
5 Common 'Cloud' Myths Many business executives are still very hesitant to trust Third Party Cloud Providers to keep their sensitive data safe in the ‘cloud’. Many common worries have arisen within the last few years and unfortunately, many myths have come from this. Take a look at the 5 common cloud computing myths, as written in The Telegraph’s article “5 Cloud Computing Security Myths” (2014). Many people are used to using cloud-based services such as Gmail that have been well known to use their client’s information for personal gains. Therefore, it is quite common that many do not fully trust anything stored in the cloud. However, business services are not handled the same as personal ones. Business Cloud Providers have different rules and regulations when it comes to their privacy approach. Any data that is stored in the cloud belongs to the company and NOT the provider. The company executives can be in control of all security settings and can ensure that everything is well protected, on top of the encryptions and restrictions put in place at the Data Centers. Cloud providers respect the client’s privacy and cannot use the stored data for their own benefit. 1. A CLIENT’S PRIVACY IS NOT RESPECTED 2. DATA STORED IN THE ‘CLOUD’ IS NOT SECURE Data Centers are believed not to be secure for a couple of reasons; firstly, because data is stored in a Data Center and not in the client’s own building and secondly, because these centers do not ‘belong’ to the client. For these reasons, many executives question the security of these centers. However, Cloud Providers, who have the expertise and knowledge in protecting sensitive data, set top security measures and restrictions at these Data Centers. Security is their top priority.

Transcript of 5 Common 'Cloud' Myths

Page 1: 5 Common 'Cloud' Myths

5 Common 'Cloud' Myths

Many business executives are still very hesitant to trust ThirdParty Cloud Providers to keep their sensitive data safe in the‘cloud’. Many common worries have arisen within the last fewyears and unfortunately, many myths have come from this.

Take a look at the 5 common cloud computing myths, aswritten in The Telegraph’s article “5 Cloud Computing SecurityMyths” (2014).

Many people are used to using cloud-based services such as Gmail that havebeen well known to use their client’s information for personal gains. Therefore, itis quite common that many do not fully trust anything stored in the cloud.However, business services are not handled the same as personal ones.Business Cloud Providers have different rules and regulations when it comes totheir privacy approach. Any data that is stored in the cloud belongs to thecompany and NOT the provider. The company executives can be in control of allsecurity settings and can ensure that everything is well protected, on top of theencryptions and restrictions put in place at the Data Centers. Cloud providersrespect the client’s privacy and cannot use the stored data for their own benefit.

1. A CLIENT’S PRIVACY IS NOT RESPECTED

2. DATA STORED IN THE ‘CLOUD’ IS NOT SECURE

Data Centers are believed not to be secure for a couple of reasons;firstly, because data is stored in a Data Center and not in the client’sown building and secondly, because these centers do not ‘belong’ tothe client. For these reasons, many executives question the security ofthese centers. However, Cloud Providers, who have the expertise andknowledge in protecting sensitive data, set top security measures andrestrictions at these Data Centers. Security is their top priority.

Page 2: 5 Common 'Cloud' Myths

3. CLOUD PROVIDERS AREN’T AS INVESTED INPROTECTING MY DATAHere is another myth about the security of cloud-stored data. Once againthough security measures can be handled by you if you so desire.Reputable Cloud Providers take this very seriously as this is theirspecialty and if anything does happen they would have no business left.Providers hire staff with the expertise to protect company data from anyunauthorized entry. Therefore, the combination of their encryptions andrestrictions and your own security measures, your data is well protected.

4. THE POSSIBILITY OF AN ATTACK BY ANOTHERUSER WITH THE SAME CLOUD PROVIDERA huge concern for many executives is about sharing a server and thepossibility of being attacked by another user on that machine. However,so far, there have been no reported cases of such a thing happening as itis very hard to accomplish. There are many protective methods in placeand, as mentioned previously, Cloud Providers take all of this veryseriously. Their team constantly manages the virtual machines andensures that there are no attacks coming from others.

5. PROVIDERS CAN HOLD DATA HOSTAGEMany worry that some providers will not allow you to retrieve yourdata and make you keep paying for their services. However, thisisn’t the case with trustworthy service providers. It is very importantto find a reputable Cloud Provider as they have the necessaryprocedures that make it easy to extract your data when you want it.

If you're looking for a Cloud Service Provider, contact us for more informationand we'll be happy to answer all your questions and appease your worries.

Created by Namtek Consulting Services For more information visit www.namtek.ca