11 Sep 2017
Why cloud solutions continue to grow despite recent high-profile spotlight
A recent survey carried out by software firm Advanced stated that 80% of businesses in the UK are still in favor of cloud adoption in the wake of global cyber-attacks like WannaCry.
One reason for the cloud’s continued boom in popularity can be put down to the undeniable factors of convenience and simplicity. Cloud solutions, like Vanderbilt’s ACT365, are ideal for small and mid-sized enterprises (SMEs) that have limited time and resources to focus on maintenance of in-house servers and hardware.
Take the example of a generic SME. Traditionally an SME’s customer, support, and office management solutions would have been managed by a big server hosted in a room at the workplace. When an update needed to be carried out, someone from IT would have to take the server down, install the update, and then manage that locally. If this business wished to expand and grow their enterprise, they would have to add more servers.
WHAT THE CLOUD has achieved, is it puts that server into a virtual space. It is still physically running on a server somewhere, but it is now a managed service for customers. So, if a business is selling cupcakes, that can now be their priority and they won’t have to worry about the management and maintenance of a large, physical machine in a dark room.
Of course, one of the greatest fears surrounding the deployment of cloud systems for companies today is their vulnerability to hackers. But, it is important to put those fears into context.
Just because security breaches exist, does not mean we should or need to live in fear of them. Knowledge is power and being observant of the risks and protection protocols can be an effective safeguard. Simply knowing how to behave, and understanding the current processes, greatly reduces the security risks of the cloud.
THE CLEAR MAJORITY of hacks can come down to the fact that someone left their password at 1,2,3, or someone clicked on something they shouldn’t have, exposing the group’s security. For instance, the John Podesta email leaks during the recent US elections were the end result of engaging with a social hacking email that advised of the need to update an email password. Instances like these have nothing to do with the cloud and training staff in best practices is the most effective combatant to reducing these breaches.
Of course, all security manufacturers need to make sure their products are tested and bent to the highest standards to defend against vulnerabilities. While there can never be a 100% guarantee that there won’t be an attack, once you test your products to the highest degree and use a solid service provider, the risk to customers is greatly deflated.