Story image

Moving to cloud? Focus concerns on operational risk, rather than cybersecurity

25 Aug 2017

Businesses should worry less about security and start addressing operational risk when it comes to moving to cloud, according to Palo Alto Networks.

The company recently conducted a survey that found 36% of Australian respondents named moving to cloud as the third biggest cybersecurity challenge for their organisations.

However, because security in the cloud is generally stronger than that used in on-premise infrastructure, operational risk is much more of a concern.

 "If organisations have the right technology in place, security shouldn’t be an issue. Moving to the cloud is an integral part of business growth: it helps address the need for compute and storage resources, and provides agility, scalability, and global reach,” comments Philip Dimitriu, Palo Alto Networks director of System Engineering, ANZ.

He says that organisations hand data to a third party when they move to the cloud. This can unnerve some business leaders.

“That doesn’t have to be the case because, in most instances, data is more secure in the cloud. And, while it’s not possible to stop all cyberattacks regardless of whether data resides in the cloud or on-premise, it is possible to reduce the risk substantially,” he explains.

Operational risk includes not only data security, but how well applications perform in the cloud. This is where businesses should focus most of their concern. If businesses suffer performance issues and can’t use certain applications, this can have a major effect on its operations, Palo Alto states.

On top of that, if data stored in the cloud is unavailable when users need it, it affects an organisation’s ability to complete orders and maintain high service levels.

“Moving to the cloud should deliver operational improvements. If the service provider can’t guarantee uptime and performance, as well as security, then it defeats the purpose: the business may as well have kept everything on-premise. Downtime and poor performance can directly affect the business’s bottom line, so it’s essential for decision-makers to address this upfront with providers,” Dimitru says.

“Decision-makers need to ensure there are legal agreements, including service level agreements, in place that cover questions of uptime, liability, performance, and data ownership. They must then regularly review the relationship to ensure it continues to serve the business needs. By doing these things, organisations can overcome the potential operational risks and achieve the transformational benefits of moving to the cloud. Cloud security should not be seen as an inhibitor, but instead as an enabler to cloud service adoption,” he concludes.

Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Tech community rocked by deaths of Atta Elayyan and Syed Jahandad Ali
Both men were among the 50 killed in the shooting in Christchurch last Friday when a gunman opened fire at two mosques.
NZ ISPs block internet footage of Christchurch shootings
2degrees, Spark, Vodafone and Vocus are now blocking any website that shows footage of the mosque shootings.
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.