PUBLISHED ON: March 6, 2013
Data security never gets easier. The current trajectory of technological innovation creates an ever-more challenging security environment, and the cloud computing revolution is no different. A recent survey indicated that a recurring problem these days emanates from company employees and departments placing data onto the cloud outside the confines established by corporate IT officers. Nearly three-fourths of those surveyed say they have been affected by this so-called “rogue cloud” computing.
As it is, many businesses already find themselves faced with a tricky decision on whether to embrace this technology and migrate their data to the cloud. Even those companies using the cloud extensively have had to decide which categories of information are suitable for cloud migration. Now, some of that strategy has been undermined by employees, divisions and departments making decisions about cloud usage that may or may not align with the corporate view.
All this makes it imperative that data be mapped to make sure the company’s IT unit knows what is stored and in what location. Only authorized information should be stored in the cloud. By following this policy — along with routine audits, employee education and company-wide reminders — most companies should be able to enjoy the benefits of the cloud without falling victim to its pitfalls.