Did you think the holiday shopping season was over because the tree’s come down and the New Year’s confetti is cleaned up? Think again! With Valentine’s Day happening and consumers scrambling for that perfect last-minute gift, it can be an easy target for hackers to take advantage of that love-induced gift-giving frenzy and break some hearts, aka your personal data. In an age where there seems to be another breach or compromised data story in the news each week, it’s not surprising that your data isn’t the only thing up for grabs; your trust in that company or brand is on the line too. A breach carries significant costs in brand reputation, future buying behavior and lost revenue. Businesses need to act rather than react and invest in proper security measures before a weakening attack occurs. It’s apparent some understand this critical need with the global market for enterprise network security set to rise to $12.5 billion by 2015, according to IDC.
Security is at the heart of the successful adoption of emerging technologies such as mobile, Big Data and cloud. In a recent cloud computing usage survey, 65 percent of participating organizations mentioned security as the top obstacle to cloud adoption. This poses a two-fold opportunity for organizations: embrace cloud and innovation in the business, and re-assess and enhance the security posture of an enterprise’s core valuable digital assets.
The sheer amount of data that needs to be managed for businesses and their customers creates new privacy challenges that are increasing daily. The rush to follow trends such as mobile and cloud without a robust security strategy can leave a company open to breaches and heartache like a middle school dance.
For these reasons and more, old security approaches just won’t cut it when it comes to these new technologies. Because cloud environments are provisioned automatically, so too must be the security. This is about being agile; we need to be able to stand up the security infrastructure at the same time we stand up the virtual environment for everything else.
Don’t let these points scare you, though! By leveraging an automated security by design approach in the cloud environment, there is greater access to people with security skills, technology that spans traditional and cloud environments and enhanced rigor in the governance processes. In our experience with enterprise clients adopting could, there are five best practices that help re-asses the approach to cloud security and reap the beneficial rewards.
Despite the obvious challenges, enterprises should look to adopt cloud to both optimize their infrastructure and innovate around new ways to interact with their customers. Cloud has the ability to provide enhanced security for your enterprise if executed correctly and safely. Educate your customers and employees so as to avoid any security pitfalls and avoid being broken-hearted.
A self-described “Big Thinker, Innovator, and Technologist with a day job as an IBM Security Exec,” Caleb Barlow is the director of Application, Data and Mobile Security at IBM. His popular online podcasts cover the ins and outs of information security, both from a business and a consumer perspective, and more than 8,000 users follow him on Twitter for the latest happenings in the world of cybersecurity and technology. Caleb is also an expert in various social technologies – in his previous role at IBM he was the director of Unified Communications and Collaboration, where he was responsible for the voice, video, web conferencing, instant messaging and social business communications under the IBM Sametime brand.
To hear the current FCC talk about it, 5G mobile service is the be-all and end-all of not only mobile communications, but the answer to most of the co…
mCart by Mavatar announces the launch of the world's first blockchain-based decentralized mCart marketplace by the FX Group.
Federal judge Richard Leon gave the $85 billion deal the green light today - and without any requirements to sell off any parts of the company. He als…
There are now thousands of blockchains, and unless you are a cryptophile, you won't recognize most of them.
Ribbon Communications tells its story at Perspectives18.