While the availability of information offered through cloud computing services and systems allows users access to the data they need regardless of location, this also presents the increased need for improved data security for both the personal data of the customers you serve and your company’s own information.
In a report earlier this year from the IBM Cyber Security Intelligence Index, U.S. businesses experienced over 1.5 million monitored cyber attacks in 2013. As if to further emphasize this fact, Sony Entertainment recently faced a breach in their security that potentially could have exposed both healthcare and salary data of their employees.
The traditional measures used for data security prior to the migration to cloud computing solutions included firewalls and intrusion detection systems that were primarily designed to prevent access to sensitive information via minimal entry points into secure networks and devices.
Today’s cloud computing environments instead feature multiple data centers managing varying sets of data which need to be readily available to multiple users with specific access rights on devices of their choosing. We at Desktops2Go® emphasize heavily on security and take multiple measures to protect your data. The data is always replicated and we enable an on-site backup scenario to make sure that the customer has access to this data in case of an emergency.
In order to better address the inherent risk and reward that comes with moving your business applications to the cloud, speaking with your provider about the following will help your business establish a good starting foundation for data security for the information you need protected:
Ensuring your software is up to date and compatible once moved from your original servers to a cloud-based solution. Our Desktops2Go® solution ensures that your software is always updated and patched with the latest security releases for you.
Proper set up of data access controls: Properly categorized data controls can deny or allow access based on multiple requirements such as user id, type of device, application set, location, and time of day.
Creation of multiple points of unique user identification, user authentication and automatic log-off timers for when users are inactive for a certain amount of time.
Set up a timetable on when system activity, logs, and logins are reviewed to know who is accessing data and when.
To find out more about cloud computing solutions and data security, contact us at VARsales@desktops2go.com or call 757-321-4000.