Blog October 31, 2014

Security in the Cloud More Important Than Ever

In today’s highly connected world, our growing reliance on the web to house everything from banking information to other personal data has made the importance of ensuring that the cloud is secure more essential than ever. It does not matter what industry you are in, data breaches are a threat to us all. According to a recent study by the Ponemon Institute, “Is Your Company Ready for a Big Data Breach?,” data breaches are becoming ubiquitous with almost half (43%) of organizations surveyed having suffered at least one security incident. That number is up 10% from 2013, continuing to reinforce the fact that cloud security is a requirement, not simply an option.

As the No Jerks Allowed company, Relentless Security™ is a mindset instilled into our company culture. Here are a few data security best practices that should be implemented (especially by a cloud hosting provider) to mitigate cloud computing security risks: multi-tiered security, awareness, tracking and physical security.

  • Multi-Tier Security:A multi-tiered approach signifies that multiple barriers and checkpoints are put in place in the event that a compromise occurs. For example: the first tier of the architecture is implemented by redundant perimeter firewalls. The firewall protects against malicious hacking and DDoS attempts. The second tier of the security architecture is implemented by the use of private, non-routable IP address spaces. In the unlikely event the firewall is breached, the servers behind the firewall cannot route traffic to the Internet.
  • Monitoring, Awareness and Tracking: With security breaches and bugs (most recently the Bash Bug) posing a continuous threat to our data, being well versed and monitoring multiple channels of information is essential in staying atop of the ever-changing security environment. Additionally, in the event of a security notice, vigilant awareness measures must be in place to swiftly review the notice and determine the severity of it. If the notice is deemed to present a serious threat, there should be patches or a set work-arounds in place to be immediately implemented. See the proper way to respond to a data breach.
  • Physical Security:All data centers are protected by a number of layers of security including multiple layers of electronic building & facility access secured by magnetic locks, 24/7 onsite-personnel, monitored and recorded closed-circuit cameras, mantraps and mandatory identity logging of all outside visitors. Hosting providers also shouldn’t risk compromising your data by allowing companies with poor security practices to share data center resources. Demand a provider that performs background checks before allowing customers to host.

At Connectria, we constantly look for vulnerabilities and continually find ways to better protect our customers’ servers and data as if it is our own. To learn more about Connectria’s hosting and security services check out our Managed and Cloud Hosting Plans.

Related Resources

HIPAA Compliance in the Time of COVID-19
Those of you providing services to patients are probably knee-deep in understanding HIPAA as it applies to extraordinary circumstances such as a pandemic. But, we…
Disaster Recovery Options For The IBM i Series
Last updated March 30, 2020 Earlier this year, the Disaster Recovery Journal released its latest figures on disaster recovery preparedness. The last time we reported…
Five Ways to Reduce Your AWS Cloud Spending
 In the cloud, as with everywhere else, every dollar counts. And as the cloud continues to grow in popularity, organizations are increasingly looking for ways…