Page 13 - CDM-Cyber-Warnings-January-2014
P. 13
Top Cloud Computing Security Trends in 2014 by Jim DeMerlis Target. Adobe. Skype. The Federal Reserve Board. The Department of Homeland Security. These were among the dozens of high-profile victims of cyber attacks in 2013. The New Year will bring even more data breach disclosures as savvy cyber crooks with sophisticated technology and billions of dollars to gain try fresh approaches to furrow into IT defenses and snatch critically important data. To help stave off intruders, companies and institutions will employ tighter cyber standards, such as the PCI DSS 3.0 standard release requiring compliance in 2015, to try to protect against them and protect the integrity of their data on the legal, social and policy fronts. While helpful in many ways, cloud computing poses fresh threats to businesses and organizations that already worry about security and protection as they move more of their IT data to the cloud. As a result, IT executives should accelerate their emphasis on authenticating and encrypting ID within the cloud. Encryption of data transfers and storage will be enforced more heavily and companies will demand that cloud providers adopt best encryption practices. The Cloud’s Importance Unquestionably, the cloud has transformed how data is accessed and shared. In the process, it has elevated mobile and wireless technology to critical business workhorses, giving users the ability to share sensitive information online thru Office 365 and other applications. As cloud adoption continues to grow, data security in the cloud has become so increasingly critical that we can expect the need for secure vital information anywhere, anyhow, anytime. In addition, most businesses deploy a hybrid cloud model including the use of private cloud, community cloud and public clouds. Businesses recognize the need for managed services in support of this hybrid cloud environment. Here are several cloud-computing security trends expected to gain traction in 2014: Cloud data-security applications will proliferate. Cloud-computing users will want to know more about where their data lives and who can access it, especially as it relates to mobile security. This will be true especially since securing cloud environments differs from securing traditional physical environments. + % %! ! & , ! . !( %+ ' "! "#+% ' - + % !& , ! % '& % & %) *"% *
   8   9   10   11   12   13   14   15   16   17   18