Cloud Computing: Your Pre Flight Check List

Cloud Computing: Your Pre Flight Checklist Cloud computing is more than a passing trend. Cloud computing is a way for small to medium businesses (SMBs) to tap enterprise class applications and infrastructure that once only large companies could afford. Cloud Computing allows SMBs to share the overhead for data center security, bandwidth, monitoring and management. Small to medium businesses share cloud based Software as a Service (SaaS) applications and Infrastructure as a Service (IaaS) without having to invest in capital intensive projects. If you are considering a move to the cloud, here is a pre flight checklist to consider. Public Cloud vs. Private Cloud With cloud computing you are moving your data and computer processing to a location other than your own. The cloud location may be shared (i.e. public cloud) or dedicated environment (private cloud). The trade off for private cloud versus public cloud is that the private cloud will be more expensive due to cost for additional security. In most cases the public cloud is more secure than your own office or business. What’s more, by sharing these resources with other companies you also may save money in the long run. While sensitive data, such as, financial records, may be more secure in the cloud, you may have regulatory requirements that prevent you from sharing common resources such as CPUs, racks or cages to store your data in a public cloud If you have compliance issues that require extra physical security, consider a private cloud solution. Cloud Migration Consideration To move to a cloud based application including SaaS, take the time to consider what data you need...

Is Your Network Safer Than The Titanic?

One hundred years ago the ship, called “unsinkable” had its hull breached by an iceberg and caused the death of over 1500 passengers. You may think your network is “invincible” like the Titanic, however, your network security policies may cause vulnerability putting your IT assets and critical data at risk. Here are several steps you can take to avoid compromising your network security: WiFi Access WiFi technology makes it easy for you to network your computers. Your WiFi signal may broadcast beyond the physical security of your office allowing uninvited visitors to access your network and compromise your network security and compliance policies. Make sure your WiFi network connections are password protected and securely encrypted. Also, consider turning off your WiFi during non business hours. By the way, wireless technology (the telegraph) saved the lives of hundreds of passengers on the Titanic. Thumb Drives and USB Drives Sharing data through thumb drives or USB drives may allow unintended computer viruses and malicious software, also known as malware, transfer from other non secure computers and enter the perimeter of your secure network. For this reason, some network administrators set strict IT policies that prevent thumb drives from being used on any office computer. There are plenty of secure services available for files sharing between computers (e.g. remote backup and remote control software). Ask your IT support professional about your policy for using USB drives and thumb drives and the impact they may have on your network security. Security Patches Operating System and Application Security patches are designed to keep your network secure. Your network security is as vulnerable as its’...
Skip to content