The Cloud is Trustworthy—If You Choose the Right Provider

Cloud is Trustworthy

Data privacy is a concern wherever confidential information exists. In the cloud, it’s even trickier, because distributed resources make knowing where data is located and who has access to it—well, tricky.

At least that’s what the skeptics have said; but the tide is turning. Mixed metaphors aside, CIOs are starting to see the benefits of cloud-based systems for every type of business function, from CRM to ERP—even HR systems. This is evidence, according to Forbes contributor Louis Columbus, of how the cloud is slowly winning the “trust war.”

“Trust is the greatest accelerator there is in cloud computing’s growing adoption, and that’s earned when cloud applications get beyond simple metrics to delivering insights and useful intelligence on secured platforms,” said Columbus.

However, the question of data security still hangs in the air. What constitutes data security in the cloud? How can you be sure your cloud service provider delivers on the promise of security, even as it distributes resources across multiple tenants to help you cuts costs and increase your ROI?

In truth, data privacy goes beyond safe data transit over digital channels. A cloud services organization is full of people, and due to the nature of their jobs, many of them may have access to your data. In an ideal world, the vendor should be able to limit data access to meeting the operational needs of the service, and prohibit direct access to support staff. In other words, the customer should be in charge of granting access to data, if requested. Additionally, SLAs should exclude data sharing and/or monetizing clauses to ensure that the cloud provider is bound by privacy requirements. Unfortunately, very few cloud services vendors have made that possible.

One major land-mine to watch out for is data monetization by the service provider. Even though customers own their data, service providers design their privacy policies such that they could build a large data warehouse or data mart to share and monetize data analytics as a business intelligence service. Given the Big Data technology revolution, it’s quite possible for every cloud provider to aggregate data from all of their customers and offer analytics services around them. Customers have to be extra diligent in reviewing the privacy policies and their updated versions, to make sure that their data privacy rights aren’t violated.

Basic security plus a little extra

When you’re deciding on what cloud solution to deploy for any business-critical function, make sure that your provider has the following cloud security procedures and processes in place:

  • Application security, including the controls necessary to ensure all your business data remains fully secure
  • Access to the application must require user authentication and password protection
  • Role-based user access to limit access to specific modules within the application
  • Secure Sockets Layer (SSL) to ensure that all information sent between your computer and the cloud server is encrypted
  • Password encryption with configurable length, composition and expiration
  • Automatic timeouts for idle user sessions
  • Provision of separate database schema for individual customers

In addition to data and application security, network protection, disaster recovery, physical security and environmental controls should also be in place. Annual audits for SSAE 16 (formerly SAS 70) compliance ensure that proper controls and processes are in place to deliver on the service commitment and keep your data safe.

Yes, you can trust the cloud—if your cloud provider is trustworthy.

Suresh Kuppahally
ABOUT THE AUTHOR
Suresh Kuppahally
Suresh is the EVP of Engineering and Ops at Replicon. Replicon provides award-winning products that make it easy to manage your workforce. With complete solution sets for client billing, project costing, and time and attendance management, Replicon enables the capture, administration, and optimization of your most underutilized and important asset: time.
Get started today.
Set up a free trial based on your business needs. Start Free Trial

Global Compliance Desk – Ireland

New Unpaid Parental Leave Entitlement The Parental Leave Acts allow parents to take parental leave from employment in respect of certain children. Under the Parental Leave Act 1998, parents of…Read More

Global Compliance Desk – Germany

Annual Leave Entitlement During Unpaid Special Leave  An employee who is continuously on unpaid special leave for a calendar year is not entitled to holiday leave in the absence of…Read More

25 Employee Payroll Tips for Small Business Owners

Recruiter | July 05, 2019 By Lakshmi Raj, Co-Founder and Co-CEO, Replicon Payroll can be a challenging task for any small business but with the right tools, it can become…Read More

Top 10 Ways to Get Employees to Fill in Timesheets

  It comes as no surprise to anyone in the business world that there is one cardinal rule when it comes to employee time tracking: employees hate to fill out…Read More

Will AI replace consultants?

The onset of AI and smart machines automating formerly-human jobs has been discussed at length as of late -- often in relation to manufacturing and manual labor jobs. And yet,…Read More

6 steps for fast-tracking profitability in your consulting practice

Advice aimed at entrepreneurs and small businesses tends to be heavily product-oriented, but in reality the majority of US small businesses fall under the “Professional, Scientific, Technical, and Other Services”…Read More
  • Cloud
  • In The News
  • Corporate
  • Professional Services Management
  • Project and Program Management
  • Shared Services Management
  • Time and Attendance Management
  • Workforce Management
  • Customer Feature
  • Feature Update
  • Time Intelligence
  • Industry News
  • Webinar Recap
  • Global Compliance Updates
  • Chat with us
    How can we help you?