Sign up | Login with →
Posted by: MIKE20 Governance Association

Is the Cloud Really Safe?

Like it?

With the rise of Apple’s iCloud and file-sharing solutions such as Dropbox and Sharepoint, it’s no surprise that SaaS and cloud computing solutions are increasing in popularity. From reduced costs in hosting and infrastructure to increased mobility, backups and accessibility, the benefits are profound. Need proof? A recent study by IDC estimates that spending on public IT cloud services will expand at a compound annual growth rate of 27.6%, from $21.5 billion in 2010 to $72.9 billion in 2015.

While the popularity and acceptance of cloud computing has certainly taken off, new questions are being asked regarding the security of third-party data hosting.  Has the centralization of IT into a few cloud computing platforms made it easier for the “bad guys” to focus their efforts? With valuable information from all departments ranging from marketing to accounting being openly shared with another organization, are your customer preferences, past orders, mailing lists, HR and financials at an increased risk for cyber threat?

Despite this concern, an alarming study by the Ponemon Institute, which surveyed over 900 IT executives across the world, found that about half of worldwide IT organizations said that no one in their organization evaluates cloud computing providers for security. Worse yet, another half said they were pretty sure that no one in their organizations knew about every cloud computing service that end users in their company were storing data on.

Can you really rely on the cloud to keep your enterprise information safe? What information are you sharing and what steps has your organization taken to evaluate providers for security?

Authored by:

MIKE20 Governance Association

Method for an Integrated Knowledge Environment (MIKE2.0) is an open source delivery framework for Enterprise Information Management. The MIKE2.0 Methodology has been built to support our belief that information really is one of the most crucial assets of a business. We believe meaningful, cost-effective Business and Technology processes can only be achieved with a successful approach for ...

See complete profile

Would you like to contribute to this site? Get started »