The adoption of cloud computing can yield several significant business benefits for companies that do it correctly. Efficiency and productivity can be improved to all-time highs, costs can be cut down and the general workflow of the business can be much more smooth, but Bill Kleyman wrote on Data Knowledge Center that businesses need to treat this change to the cloud in a serious fashion and make alterations to data security policies to help make way for the new technology.
"The truth is that cloud computing is relatively new for many organizations,' he wrote on the website. "This means that companies looking to enter the cloud must be careful and avoid jumping in with both feet. Although every environment is unique, administrators must take the time to create a plan which will help them retain control over their cloud initiative."
When looking to create a new policy for user security, he said businesses need to keep the following recommendations in mind:
- Have an update of the cloud and general computer usage policy that will look at which devices, clouds and other pieces of technology can be used by employees
- Provide a list of acceptable and unacceptable actions on the cloud, constantly updating them
- Train users on best practices for data security and use of the technology
- Look to start a stipend program if there is going to be a mobile or personal cloud program
Figuring out which devices should be used, it is best to avoid what Kleyman wrote on the website could be a "free-for-all."
"As mentioned earlier, it's very important to have an approved device list," he said on Data Center Knowledge. "Many cloud environments hit serious snags when administrators take the concept of 'any device' a little too seriously. Some phones or types of computers may just not work well with a given initiative. Have a solid plan as to which devices will be used and develop a plan around those end-points."
Other best practices to keep in mind to have the cloud sorted out as soon as possible should include monitoring how employees are using their devices, having a mobile management platform in place and always being flexible and ready to update at a moment's notice.
Keep control of the cloud environment
There should more security considerations that companies keep in place, according to Kleyman, including a security plan across the entire business, an easy way to evolve security settings and the ability to completely control the cloud security of a company. Having control of the cloud will mean spending less time on fixing problems in the cloud and more time working on value-adding pursuits.
A lot of control comes from knowing about the cloud and gaining knowledge about the best practices for keeping all data secure in the environment. Scott Cain wrote on Network World that planning and researching is a key step to take to cloud security that many businesses may not do.
"Understand exactly what you want to achieve and what type of data you want to move to the cloud," he wrote. "Research the market and the different services, service level agreements and security features available. Investigate hosting and find out the regulatory implications of data being stored in different countries."
Cain believes companies also need regularly review their cloud situation, prepare for what it means to have data in the cloud and always put the perspective cloud provider under a microscope for whom the data will be with, how they are auditing security and how the company makes sure it is staying secure
Cloud Security News from SimplySecurity.com by Trend Micro