This vendor-written tech primer has been edited by Executive Networks Media to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
More than a third of businesses in the United States currently use the cloud, but by 2020 that number is expected to more than double to a whopping 80%. But even though the cloud is secure, it doesn’t guarantee immunity from data breaches. Now that the cloud is rapidly becoming a mainstream part of IT, businesses must think more critically about how to bolster their security beyond cloud providers’ default security infrastructure—which often proves to be inadequate for the changing face of business.
Conventional cloud providers make a good effort to offer robust security measures. They generally come equipped with server-side encryption, user controls, data restoration abilities, and device wiping capabilities meant to protect your files in the cloud. Still, despite these measures, there’s a major—but little discussed—gap in cloud security, and it has to do with that other major mobile work trend, BYOD.
More than 40% of American employees use personal smartphones, tablets, or flash drives for work purposes, and 83% admit they prefer cloud apps to their on-premise equivalents and are likely to seek them out. But whether or not an employer explicitly sanctions cloud and app usage, the same problem persists: Once files are synced to a mobile device—which, let’s face it, is a major reason to use the cloud in the first place—the cloud provider’s default encryption disappears, and files are exposed on the cloud.
More than 70 million smartphones are lost each year. Add to that the number of lost and stolen tablets, flash drives, and laptops, and it’s easy to see just how easily unencrypted data can fall into the wrong hands. Lost and stolen devices are one of the main contributors to data breaches—and it’s largely because of this lack of encryption on devices.
The good news is that despite the existing flaws in cloud security, protecting your files is possible. There are a few simple ways to get more out of default cloud security infrastructure to keep your business secure and compliant with any number of federal regulations:
* Encrypt data at the file level. It’s no longer sufficient to protect only the perimeter, which, these days, is pretty much the same as relying only on server-side encryption. Encrypting files only at rest isn't enough either — unless your team isn’t syncing any files to the cloud, which just isn’t a feasible option in today’s cloud-based ecosystem.
File-level encryption, on the other hand, protects the data itself (rather than just the place it’s stored) before it ever reaches the cloud. This means that files will remain encrypted wherever they go, including mobile devices, and only authorized users will be able to retrieve them. Deploying this kind of encryption to bolster cloud providers’ default precautions is paramount for keeping financial information, personal data, and intellectual property secure, particularly in a workplace that encourages BYOD or where team members work remotely or on the go.
Sign up for CIO Asia eNewsletters.