Security

IT Manager: Data Protection

As an IT Manager using cloud services, how do you ensure your data is properly protected? What steps would you take and questions would you ask?  Include a discussion about disaster recovery.

Due to the always increasing complexity and size of data storage systems, data storage security needs to be just as sophisticated. New threats and attacks come out every day, and the only way to be prepared for hackers and surprise accidents or disasters is to increase security. For larger businesses, outsourcing a data storage service is often the best choice. Using a third-party data security company provides many benefits, such as a larger workforce, advanced security, and backup hardware and programs, as well as options for cloud storage.

As a current IT manager, many of the products and services my organization use are cloud-based. Securing cloud services follow many of the same steps for increasing security on anything IT-related yet might be facilitated differently. The first suggestion would be to merely research the cloud service you are using in its entirety; one must know what they offer, how they protect data, and who has responsibility for any errors, breaches, or hacks. Preventing unauthorized access to computers using complicated authentication protocols such as passwords or keycards should be set in place. Even with most of the data not residing on the organization’s physical hardware, an intruder can access the information if they can access the system.

With the advancement of removable storage devices, the likelihood of sensitive company data being accidentally or purposely removed from a business is increased; to combat this, it is recommended to set up policies for personal and company equipment, including a robust inventory management system. Using updated firewalls, anti-virus, and anti-spyware programs will decrease the chance of unauthorized access or dangerous malware infecting a company’s data. Continuous auditing and reporting of the cloud service’s performance, security, and status must always be performed, as well as with constant updating of the cloud’s applications and those that communicate with it. Finally, penetration tests, employing skilled professionals, and following proper cloud laws, rules, regulations, and policies are all effective. Since there is no such thing as completely secure data, disasters can always occur. Even with cloud storage’s boast of high security, it is always recommended to have both off and on-site data backups. By following these suggestions, securing cloud data should be relatively simple and make life that much easier.

References

Thakur, Tushar. (n.d.).  Data storage and security: Tips on everything you need to know. Retrieved October 19, 2020, from http://xtendedview.com/internet/data-storage-and-security-tips-on-everything-you-need-to-know/2065/.

Mell, P. Grance, T. (n.d.). Effectively and Securely Using the Cloud Computing Paradigm. Retrieved October 19, 2020, from https://csrc.nist.gov/CSRC/media/Presentations/Effectively-and-Securely-Using-the-Cloud-Computing/images-media/fissea09-pmell-day3_cloud-computing.pdf.

Categories: Security

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s