“According to a report on cloud computing prepared by McAfee, up to 87% of the companies surveyed believe that the use of the cloud has contributed to increased productivity. In turn, more than half of the respondents recorded improved security of data placed in the cloud. The technology is increasingly reliable. However, ensuring full security of information includes additional factors.”
Here are some of the most important elements for a safe cloud service.
1. UI/UX should support data security.
“In this context, human error is one of the most serious challenges for the security of sensitive data. In the era of the growing importance of UX (user experience), user needs for simplicity and intuitiveness of software must not compromise the technological basis of security of digital solutions. The system must, therefore, be simple enough for the user not to have problems with its operation, but complex enough to counteract the threats. It should also support the elimination of the most common threats lying on the operational side, in a way encouraging the user to apply good practices and educating him.”
The basic features for a secure design are identification and authentication that means using a login and password, even if the passwords aren’t the most comfortable solutions for users especially on mobile devices but there is a justification for using them, particularly when enterprises have to take care of protecting strategic data while sharing them.
2. Data room uses less natural resources
The advantagesof using a Cloud Service are that the companies do not need to make copies of documents or reports and this is a very safe method as well as this it’s ecologic because it gives the possibility to companies saving the paper, the energy, and the users have more secure access.
3. Using passwords is just the beginning
“Even if both conditions are met, i.e. if the user is correctly identified (login) and authenticated (password), we cannot speak of full security. Threats go far beyond the login mechanism and the designer’s task is to constantly seek a compromise between user comfort and protection. The ideal situation is one where the user does not have to think about his or her security at all. In practice, when it comes to protecting privacy or company secrets, such a solution does not exist. After all, login data and authenticated sessions must also be protected.”
That’s why the technologymust be constantly adapted, by using the most advanced data protection, by changing periodically the password, or the impossibility to log in at the same time using the same login or limiting the pool of IP addresses from which it is possible to log in to the system.
4. The user has a direct impact on data security
“It can be stated with a high degree of certainty that the key to data security is the compromise between technology and proper usage practices. However, the growing level of integration of friendly design and security of software and application of good practices exposes companies to the ever-increasing danger of phishing, i.e. attempts to defraud electronic data. These, unfortunately, are becoming increasingly creative and sophisticated.”
To prevent these attacks, the companies must use online services anti-phishing protection and paying attention to every email and every link the click.
Source:Safe cloud and the user – a marriage of convenience, by Chris Pytel