Pest Management Professional, September 2015
Mobile pmp By Will Nepper Senior Editor Be smart when implementing cloud technology The cloud makes business data storage and delivery a breeze but there are pitfalls to note prepare for and avoid Editors Note This is the second of a two part series Please see PMPs August 2015 issue for Part I A s you likely already know cloud storage is a service model in which data is maintained managed and backed up remotely and made available to users over a network typically the Internet Source WhatIs com In addition to what we covered in the August Mobile PMP column p 90 here are four additional factors to keep in mind to help ensure you your company your employees and all related data remain safe and secure in the cloud 1 Encryption is the most important and viable way to protect your companys data when employing the cloud If you have only a vague idea of what encryption means think of it this way Data is transformed into a coded form rendering it unreadable to anyone not authorized to access it There are numerous systems from which to choose The best way to cut through the confusing process of protecting data is by assessing the threats and risks your companys data faces Last month I mentioned the importance of a data audit for developing a security policy Similarly a risk audit and or threat assessment can help you identify weaknesses in your data armor Combine your data audit results with your risk audits and youll have created a good guide in your pursuit of the encryption service that best suits your business needs 2 Managing mobile devices is another way to secure cloud based business data When devices are for both business and personal use the impact is twofold Unprotected mobile devices are like portals into your cloud data an open invitation to malicious hacking Thats why a wide variety of mobile application management MAM and mobile device management MDM tools have been developed to close the portal and rescind the invitation Many MDM and MAM manufacturers and vendors offer features including synchronization and secure network tunnels for business data Whether the mobile devices used by employees are company provided or purchased independently synchronizing the type of security for all devices used by your company makes data protection substantially more effective 3 Evolving with technology is one of those rules of data storage and transference that seems like a no brainer but is commonly overlooked The process of evolution is essential No matter how airtight your security systems are theyll become outdated or obsolete sooner than you might guess You cant put a security system in place and walk away Regular reviews that systematically examine the details of your security systems are vital Protecting data is an ongoing process Luckily the most reliable manufacturers and vendors of cloud security systems do most of this work for you by alerting you to critical updates that will strengthen your security against the latest threats You should be revisit your security plan quarterly if not more often 4 You get what you pay for This old adage couldnt be more appropriate than when its applied to cloud security There is a distinct difference between the cloud services designed for consumers and businesses The perceived appeal for consumer services is that theyre substantially cheaper But consumer safety and business safety are completely different arenas The amount of data alone should be enough to illustrate the primary difference between consumer and corporate data An individual consumers address book and social connections are like a treasure trove for cyber villains looking to exploit weaknesses in security Imagine the treasures that could be mined from an entire companys data a company like yours pmp You can reach NEPPER at wnepper@ northcoastmedia net or 216 706 3775 Photo istock com fandijki 130 September 2015 pest management professional mypmp net
You must have JavaScript enabled to view digital editions.