{"id":3674,"date":"2015-01-20T18:16:22","date_gmt":"2015-01-21T02:16:22","guid":{"rendered":"http:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/"},"modified":"2015-01-27T17:21:48","modified_gmt":"2015-01-28T00:21:48","slug":"cloud-computing-secure","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/","title":{"rendered":"Is Cloud Computing Secure?"},"content":{"rendered":"<p dir=\"ltr\">In the early days of Cloud computing, the common perception was that the Cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed they were sacrificing security for the business agility that comes with using Cloud systems. Yet, as Cloud adoption becomes more universal, these high levels of adoption are actually seeing an increased level of trust in Cloud computing systems, which begs the question: Can the Cloud lead to more secure computing?<\/p>\n<h4>Traditional Network Security<\/h4>\n<p dir=\"ltr\">Traditionally, organizations have used on-premises security solutions or contracted with network security experts to protect their network, data, and applications. Data centers imbue a sense of security and control for businesses \u2013 feeling more secure is likened to locking down a warehouse and visualizing that anything within the walls of the organization is safe. There\u2019s no question, then that businesses feel an inherent unease with the Cloud concept, because the approach itself seems insecure; your data is stored on servers and systems you don\u2019t own or control. Yet, does control necessarily equate to security?<\/p>\n<h4>The Cloud is Just as Safe as On-Premises Security<\/h4>\n<p dir=\"ltr\">IT security experts are claiming that fears of the Cloud being unsafe can largely be put to rest. In fact, the Cloud may actually be able to improve the state of IT security. Many Cloud \u00a0security experts dispel the Cloud insecurity myth. Many believe the Cloud is \u00a0more secure than traditional systems. So, can your business trust your Cloud Service Provider (CSP) to also handle network security?<\/p>\n<h4>Which Platform is Right for Your Business?<\/h4>\n<p dir=\"ltr\">The answer depends on your needs as a business. Cloud providers can give end users a flexible infrastructure hosted from reliable systems, but your network can become compromised just as quickly by bad policy decisions as an on-premises environment. Speed of incident response and depth of forensics are just as important in preventing security attacks in the first place \u2013 the Cloud shows advantages in both of these areas. If you choose to go with the Cloud, make sure you are communicating with your Cloud provider to ensure they are meeting security standards.<\/p>\n<p dir=\"ltr\">In conclusion, IT security experts have agreed that Cloud systems are not inherently unsafe, but businesses still must exercise good judgment when it comes to developing a plan for network security. The best course of action is to focus on a well-defined and executed security strategy with the right technology with whichever platform you choose. If your organization needs guidance learning more about network security, contact your trusted IT advisor today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the early days of Cloud computing, the common perception was that the cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed they were sacrificing security for the business agility that comes with using Cloud systems.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[6],"tags":[8,9,10,13,15,18,24,25,28,40,54,55,57,64,65],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Cloud Computing Secure?<\/title>\n<meta name=\"description\" content=\"In the early days of Cloud computing, the common perception was that the cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed they were sacrificing security for the business agility that comes with using Cloud systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/\",\"name\":\"Is Cloud Computing Secure?\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2015-01-21T02:16:22+00:00\",\"dateModified\":\"2015-01-28T00:21:48+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"In the early days of Cloud computing, the common perception was that the cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed they were sacrificing security for the business agility that comes with using Cloud systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Cloud Computing Secure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Cloud Computing Secure?","description":"In the early days of Cloud computing, the common perception was that the cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed they were sacrificing security for the business agility that comes with using Cloud systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/","url":"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/","name":"Is Cloud Computing Secure?","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2015-01-21T02:16:22+00:00","dateModified":"2015-01-28T00:21:48+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"In the early days of Cloud computing, the common perception was that the cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed they were sacrificing security for the business agility that comes with using Cloud systems.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/cloud-computing-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Is Cloud Computing Secure?"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/3674"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=3674"}],"version-history":[{"count":1,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/3674\/revisions"}],"predecessor-version":[{"id":3677,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/3674\/revisions\/3677"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=3674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=3674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=3674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}