Wednesday, May 6, 2020
Understanding A Data Breach - 1111 Words
Understanding a Data Breach Ten years ago business professionals were grappling with the decision of whether to implement cloud computing into their organizations. Today, we no longer have the luxury of ââ¬Å"Ifâ⬠we will embrace the new technology but rather ââ¬Å"Howâ⬠we will make it as safe as possible. The Article In his November 2013 article published in Business Finance Magazine, ââ¬Å"The Real Security Risks of Running Finance Apps in the Cloudâ⬠, Ramesh Rajagopal suggests that the real threats with cloud computing fall into two main categories, data compromise through exploit and data compromise through user misstep. Data Compromise through Exploit Rajagopal maintains that the very nature of browsers themselves lends itself to exploitation.â⬠¦show more contentâ⬠¦These computers would only be used for one purpose for example accessing a companyââ¬â¢s banking portal. I find this theory to be impractical at best. Most companies that are leveraging cloud services are doing so for the benefit of ease of use. Larger companies often have employees or consultants working off-site or in multiple locations. Accountants and executives are increasingly pushing to be able to access their data at any time, from anywhere, using any device. Data Compromise through User Misstep Rajagopal does not cover the topic of BYOD extensively in his article. ââ¬Å"In the consumerization of IT, BYOD, or bring your own device, is a phrase that has become widely adopted to refer to employees who bring their own computing devices ââ¬â such as smartphones, laptops, and PDAs ââ¬â to the workplace for use and connectivity on the secure corporate network.â⬠(Beal, 2014) This can cause increased security risks as there is no way for corporate IT to insure that the traditional protections methods are up to date and functioning properly or even installed at all. While it may be cost effective to allow employees to furnish their own
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.