There has been widespread attack on security of data and there has been a clamor to bring back data into the data centers and set the clock back on cloud computing and the internet.
This has been driven by panic and a lack of understanding by many on the risks associated with data in motion, any data in motion is vulnerable to attack and capture whether encrypted or otherwise.
Data in motion can be in device and more importantly a network whether private or internet, the risks are compounded based on the medium in which data is in motion.
Any government requesting data and data encryption security features like keys and algorithms do so to secure and protect the country. The governments primary business is to protect its citizens in a complex world run on digital technology and it is every citizens duty to cooperate with the government .
There are fears that government's access to Business Data will blunt the competitive advantage of the business and put it at a disadvantage. This is far from the truth, why would any government want to hurt business which is its main source of taxes and generator of employment and commerce.
Rather businesses that are open to unethical business practices and more importantly insider trading are those who may be most worried about sharing their data with the Government agencies.
The laws of most countries give legal access to Government agencies to business information and this is not snooping, rather the havoc created by cyber-criminals on business data is much more then what the government would ever achieve with your business data.
Another aspect is any data on a network is vulnerable including your data centers which connect to the internet and other networks, the features provided by cloud computing vendors for security when used prudently can give you a better security posture at a lower price point then what you can implement in your business data center and networks.
This is a wake up call for companies to look at cloud computing with IT GRC as the first point of evaluation; if you are already in the cloud then revisit your IT GRC posture.
A cost benefit approach to data security and the cloud/internet will help in overcoming the misplaced concerns on data security.
Finally if you do not understand the Information Life-cycle Management and data protection risks and the available solutions to mitigate them, hire an expert to help you with your IT GRC strategy to protect your business data and also overcome your fears; you will also need legal counsel to understand and interpret your countries posture on data collection. Freedom of Speech and right to privacy can only exist in countries where the government is vigilant.
This is an opportunity for information security professionals &solutions companies to work with business and help them secure their data and assist them in overcoming their misplaced apprehensions.
It is also an opportunity for legal experts who specialize in data privacy, information security and compliance to assist companies in getting their act together by educating them on the various aspect of the law in their countries.
We have nothing to Fear other then Fear itself,so get the right arsenal and take your business to the cloud confidently and securely.
This has been driven by panic and a lack of understanding by many on the risks associated with data in motion, any data in motion is vulnerable to attack and capture whether encrypted or otherwise.
Data in motion can be in device and more importantly a network whether private or internet, the risks are compounded based on the medium in which data is in motion.
Any government requesting data and data encryption security features like keys and algorithms do so to secure and protect the country. The governments primary business is to protect its citizens in a complex world run on digital technology and it is every citizens duty to cooperate with the government .
Do not allow your cloud computing plans to wilt, there is a bouquet of security strategies to protect your data. |
Rather businesses that are open to unethical business practices and more importantly insider trading are those who may be most worried about sharing their data with the Government agencies.
The laws of most countries give legal access to Government agencies to business information and this is not snooping, rather the havoc created by cyber-criminals on business data is much more then what the government would ever achieve with your business data.
Another aspect is any data on a network is vulnerable including your data centers which connect to the internet and other networks, the features provided by cloud computing vendors for security when used prudently can give you a better security posture at a lower price point then what you can implement in your business data center and networks.
This is a wake up call for companies to look at cloud computing with IT GRC as the first point of evaluation; if you are already in the cloud then revisit your IT GRC posture.
A cost benefit approach to data security and the cloud/internet will help in overcoming the misplaced concerns on data security.
Finally if you do not understand the Information Life-cycle Management and data protection risks and the available solutions to mitigate them, hire an expert to help you with your IT GRC strategy to protect your business data and also overcome your fears; you will also need legal counsel to understand and interpret your countries posture on data collection. Freedom of Speech and right to privacy can only exist in countries where the government is vigilant.
This is an opportunity for information security professionals &solutions companies to work with business and help them secure their data and assist them in overcoming their misplaced apprehensions.
It is also an opportunity for legal experts who specialize in data privacy, information security and compliance to assist companies in getting their act together by educating them on the various aspect of the law in their countries.
We have nothing to Fear other then Fear itself,so get the right arsenal and take your business to the cloud confidently and securely.
Comments
Post a Comment