cloud-for-remote-work

The COVID-19 pandemic is fueling reliance on remote work, thereby increasing the need for cloud computing in organizations.

The video conferencing platform Zoom has received a 300% day-to-day increase in use, according to a JPMorgan study. Additionally, Microsoft’s collaboration platform Teams saw a jump in 12 million daily users the week of March 18. In India, 64% of organizations are expected to transition to cloud computing amidst the pandemic. In Europe, a cloud computing project dubbed Gaia-X—a collaboration between the European Commission and the French and German governments—aims to create a European-based cloud environment that will lessen the continent’s dependence on private companies. 

“Cloud computing, which has been touted for its flexibility, reliability and security, has emerged as one of the few saving graces for businesses during this pandemic,” writes Evan Ellis, CEO and President of K2, in Forbes. “Its use is critical for companies to maintain operations, but even more critical for their ability to continue to service their customers. However, many organizations have lost sight of the original purpose of the cloud and are therefore failing to fully harness its potential.”

The Benefits of Transitioning to the Cloud

Without cloud computing, this large-scale dependence on remote work would not be possible. As the pandemic pushes more organizations to rely on the cloud, it will likely speed a shift from hybrid public-private cloud models to fully-integrated cloud models. According to David Linthicum, Chief Cloud Strategy Officer at Deloitte Consulting LLP, the benefits of fully transitioning to the cloud include:

1) Flexible storage: Because the public cloud is more flexible than physical storage, it offers benefits such as virtual servers that don’t need to be managed manually, quick access to on-demand storage with no limit to the amount you can store, and the ability to embed resiliency.
2) The ability to shift processes to different areas in the cloud and maneuver around disruptions.
3) Enhanced security features including identity advanced encryption in flight and at rest, multifactor authentication (MFA), access management (IAM), and biometrics.
4) Advanced remote control over assets in the public cloud in situations where physical assets cannot be accessed, such as the current situation of widespread business closures during the pandemic.

How to Adopt Fully to the Cloud

To transition fully to the cloud, Ellis recommends the following steps:

1) Have a plan: Make an assessment of your current infrastructure before moving forward.
2) Prepare your apps: Some apps may already be ready to move to the cloud, while you may need to be modernize or replace others.
3) Make the commitment to transition fully to the cloud: Enable and train your users to utilize apps in the cloud. Additionally, prepare to adapt to a cloud system that will require smaller and more frequent updates.

Understand the Challenges

Before moving forward, you’ll need to consider the challenges involved. First, inexperienced IT professionals may inadvertently expose private data when transitioning data to the public cloud—meaning it is vital to make sure they are properly trained before making the transition. Second, it’s important to have a good understanding of how much storage you will need to provision before you make the switch.

“The overall message here is that there is value in looking at potential cloud computing solutions,” writes Linthicum. “When the crisis passes and IT falls into a ‘new normal’ routine, enterprises should assess how well they fared through the event by checking in with their ops teams. If your ops teams have worked regular days during the crisis, chances are you had the right mix of cloud or noncloud technology. A stressed ops team could mean there is much that can be improved.”

Understand the Cloud

Learn more about the benefits and challenges of cloud computing and how it pertains to your organization. Check out the Cloud Computing Course Program, which offers 37 self-paced courses focused on various aspects of cloud computing technologies.

Contact an IEEE Content Specialist for more details about getting access to this program for your organization.

Interested in getting the program for yourself? Visit the IEEE Learning Network today.

Resources

(3 June 2020). 64% Indian firms to adopt cloud computing amid COVID-19 pandemic: IDC. The News Minute.

Potoroaca, Adrian. (4 June 2020). France and Germany back plans to create a European cloud computing ecosystem dubbed Gaia-X. TECHSPOT.

Linthicum, David. (26 May 2020). Leveraging The Cloud During The Pandemic. Forbes.

Ellis, Evan. (22 May 2020). The Current Pandemic Gives Cloud Computing A Needed Jolt. Forbes.

cloud-security-storage-risks-cyber-attacks

Cloud security threats come in many different forms including data breaches, hijacked accounts, data loss, denial of service, and system vulnerabilities. As organizations and individuals continue to adopt the cloud, securing all of the stored information is a top priority. Companies must be aware of the risks and solutions in order to prevent serious damage.

Security Risks to Cloud Data

Data Breaches

Any data stored in the cloud is at risk for cyber-attack. From phishing to security scams, hackers are constantly developing new ways of gaining access to sensitive information. This type of attack can damage a company’s reputation and affect its market position. Furthermore, it can also lead to legal issues if customers’ personal information was released.

Access Management

Without multi-factor authentication and strong passwords, cyber criminals can easily gain access to accounts. Once they’ve hacked into one account, unauthorized users can access private information. Depending on the hacked account’s permissions, bad actors could cause a sizable data breach.

Insecure interfaces

Because your company’s API and UI are exposed to the public, having strict authentication can help ensure that cyber criminals cannot gain access. However, inadequate security leaves your interfaces vulnerable to attack. Possible consequences include jeopardized confidentiality, accountability, integrity, and availability.

Data Loss

Although many cloud providers heavily focus on security, not all attacks can be prevented. Should hackers gain access to your system, it’s possible that they could erase all of your data with the intention of ransoming it. If no backup storage is in place, your organization could face a permanent loss of data.

Hijacking

Account hijacking is a form of identity theft that involves cyber criminals using stolen information in their attacks. When this occurs, your organization can lose control of its account, data, functions, business logic, and any other dependable applications on the account. A breach of this form should be taken very seriously. It can lead to large data leaks and damage to the company’s reputation.

Insiders

While outside hackers may be the first party that comes to mind, they are not the only threat to your cloud’s security. Current or former employees also pose a risk. Because they already have access to the company’s sensitive information, a malicious insider could expose or sell proprietary information. To minimize the risk of an internal attack, it’s vital to ensure user permissions are kept up to date based on employment status.

Best Practices for Cloud Security

As more people store their information in the cloud, the risk of cyber attacks increases. With a larger pool of potential targets, bad actors are furthered incentivized to develop new schemes. Despite this, the cloud is still a worthwhile storage option.

Steps you should take to secure your information include:

  • Encrypting data
  • Using two-factor authentication
  • Understanding open API frameworks
  • Making sure everyone uses hard-to-crack passwords
  • Restricting accessibility to sensitive information

Protect your business

Having the right tools and systems in place can prevent data breaches and cyber crimes. As the world becomes more automated, it’s crucial for your organization to understand the available cyber security measures to protect its data and devices. Cyber Security Tools for Today’s Environment, an online 11-course program from IEEE, helps businesses improve their security techniques.

Contact a specialist today to get access to the course program for your organization.

Interested in learning about getting access to the course for yourself? Visit the IEEE Learning Network to learn more.

 

Resources

Nailwal, Mukesh. (14 October 2019). CLOUD SECURITY BASICS: HOW TO ENSURE THAT YOUR DATA IS SAFE. Techgenix.

Soni, Rakesh. (11 October 2019). The Rise of Cloud Computing Threats: How to protect your cloud customers from security risks. Customer Think.