Cloud security in the spotlight

1 November 2013 Information Security

Simply put, cloud computing is computing based on the Internet. Where in the past people would run applications or programs from software downloaded on a physical computer or server in their building, cloud computing allows people access to the same kinds of applications through the Internet.

Pfungwa Serima, CEO of SAP Africa
Pfungwa Serima, CEO of SAP Africa

A recent survey conducted by SAP, market leader in enterprise application software, in collaboration with Oxford Economics, revealed that data security is among the top three concerns for those considering operating in the cloud. But no one can contest that the cloud is here to stay. By 2015, SAP Cloud aims to be a €2 billion annualised business that connects over two million companies and automates over $1 trillion in inter-enterprise commerce globally.

Despite many myths that pervade around the topic of cloud security, as well as cloud’s relevance for Africa, security in the cloud is improving rapidly, quite a feat if one considers the growing number of mobile devices that are entering the business environment.

The same cloud platform which helps companies secure unparalleled business rewards at a fraction of the price of traditional IT naturally comes with some risk. Globally, organisations which are security savvy have realised that external threats are only part of the overall picture. On numerous occasions security breaches have been caused by a mistake on the part of an employee. In this context, education is critical and the first point of protection for any corporate. Maintaining appropriate network access controls is clearly important too.

SAP acknowledges that threats are more targeted, sophisticated and destructive now more than ever before. Amongst other things, there is a growing focus on cyber-espionage and phishing techniques.

Across the globe CIOs, CSOs and even IT managers face the same problem of not knowing the exact location of the data (company and customer information, and records) in the cloud. This is because virtualisation technology creates multiple copies of the data and in many cases the data can reside on partner and third-party servers.

It is obviously of paramount importance to handle data with utmost discretion and deliver services that allow business critical processes to run securely. Of primary importance has always been the protection of customers against unauthorised data access and misuse, as well as confidential data disclosure.

But to make cloud computing safe and viable, organisations must address a broad array of issues; in addition to employee education, information needs to be classified and tracked more effectively, computing environments need to be more scalable and extensible, and cooperation across enterprises must improve.

Understanding the enormous possibilities that cloud can offer requires an in-depth appreciation of business processes as well as IT systems, connection points, and processes. This will help the IT department track the flow of relevant data, and thus be able to deploy the right combination of tools and strategies so as to be able to provide maximum protection.

An effective strategy requires more than simply identifying and classifying data into tiers. It is essential for the IT department to understand the value of specific data sets and the potential cost of a data breach. Vulnerabilities in the business can affect everything from brand image to sales, share price, to employee morale.

With cloud computing the perception of Internet security has changed at the fundamental level. And, at SAP we realised that trust is the #1 asset and brand value in cloud computing. Data security and data privacy is part of the DNA at SAP – and to earn customer’s trust is our objective.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...