In a recent study 49% of CIOs and CFOs listed security fears as the primary barrier to adopting a cloud solution.

The arrival of Cloud computing has brought with it new opportunities, many of them offering cost-savings and convenience as an attractive benefit to businesses and enterprises – however, when it comes to the security of company data and the viability of moving user data into the cloud, Enterprise CIOs are not so enthusiastic.

An NTT Europe Online survey of 200 CIOs and CFOs of UK-based companies with 500 or more employees (and a turnover of £100m or more) revealed that:

67% of respondents were not planning to adopt cloud computing or were unsure of its adoption within the near future.

49% of CIOs and CFOs listed security fears as the primary barrier to adoption.

While the above statistics relate to cloud-based services as a whole, we can assume with great accuracy that the attitude towards cloud-based service solutions that target company data will be similar at the very least, if not substantially more suspect.

Gartner lists the following seven risks associated with cloud computing and data security.

1. Privileged user access. Moving business critical data offsite means removing the “physical, logical and personnel” controls IT departments exert over in-house programs. Not knowing who will have access to company data is, of course, a major concern for company CIOs.

  1. 2. Regulatory compliance.Whether a company keeps its data in-house or in the cloud, it is ultimately responsible for the integrity and security of its data. Without stringent audits and security certifications one cannot begin to consider placing business critical and other sensitive data in the cloud – and even then, the guarantees are not always 100%.
  2. 3. Data location.The question, “Where exactly is our data located?” does not have a simple answer in the cloud. Any viable solution would have to commit to storing and processing data in a jurisdiction approved by the client’s CIO and then contractually commit to obey local privacy requirements, and other possible legislation, surrounding data security.
  3. 4. Data segregation.Typically, data in the cloud is in a shared environment alongside data from other customers. Encryption can be effective but it’s not a bullet-proof solution. In fact, encryption accidents can make data totally unusable or complicate availability.
  4. 5. Data recovery. What happens in the event of a disaster? Is company data replicated across multiple sites and how long would it take to do a complete restoration? These are just some of the questions CIOs are asking. “How quickly can we continue normal business operations?”is the key question any company disaster recovery (DR) plan needs to answer.
  5. 6. Investigative support.Gartner reports that “investigating inappropriate or illegal activity may be impossible in cloud computing because logging and data for multiple customers may be co-located and / or be spread across an ever-changing set of hosts and data centers.” Without a contractual commitment to support specific forms of investigation and proof that it has been done successfully in the past, the reality is most investigation and discovery requests will be impossible.
  6. 7. Long term viability. Will company data remain available should the cloud services provider’s business fold, or if the business is acquired by another company?

Added to the above Seven cloud-computing security risks as highlighted by Gartner, CIOs also need to consider their ability to report on, and prove, the effectiveness of their data backup and recovery strategy and the speed, accuracy and simplicity of data recovery.

CIOs also need to consider the bandwidth and infrastructure impact of thousands of users backing up their data to a cloud service, along with the absence of control over what kind of data users choose to backup.

If continuous access to business critical data is key to a company’s ability to operate effectively, it would seem that a cloud-based solution for enterprise data does not currently enjoy a vote of confidence in terms of data security, accessibility, control and operational efficiency.

As it stands the majority of CIOs agree that a reliable, automated, solution that allows for easy, risk-free management of user data, remains the key component of an effective data backup and recovery strategy for user data residing on company laptops and desktops- We can’t ignore the cons of cloud backup.

Want to know more about selecting a backup solution? Read our blog on endpoint user data protection

FEATURED POSTS
IT Managers: How to Protect Your Users Against Ransomware

The best way to protect yourself, your users and your business against ransomware is by setting up a proactive defence. The ransomware statistics paint a frightening picture for anyone in charge of IT: In Q3 2016 alone, 18 million new malware samples were captured. Source: Panda Labs   What that means is that the criminals…

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers of 2016 Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions of 2016 by CIO Review. The list, compiled by industry insiders, highlights leading global…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Discover how easy endpoint data protection can be