Understanding A Data Breach?

1111 Words5 Pages
Understanding a Data Breach Ten years ago business professionals were grappling with the decision of whether to implement cloud computing into their organizations. Today, we no longer have the luxury of “If” we will embrace the new technology but rather “How” we will make it as safe as possible. The Article In his November 2013 article published in Business Finance Magazine, “The Real Security Risks of Running Finance Apps in the Cloud”, Ramesh Rajagopal suggests that the real threats with cloud computing fall into two main categories, data compromise through exploit and data compromise through user misstep. Data Compromise through Exploit Rajagopal maintains that the very nature of browsers themselves lends itself to exploitation.…show more content…
These computers would only be used for one purpose for example accessing a company’s banking portal. I find this theory to be impractical at best. Most companies that are leveraging cloud services are doing so for the benefit of ease of use. Larger companies often have employees or consultants working off-site or in multiple locations. Accountants and executives are increasingly pushing to be able to access their data at any time, from anywhere, using any device. Data Compromise through User Misstep Rajagopal does not cover the topic of BYOD extensively in his article. “In the consumerization of IT, BYOD, or bring your own device, is a phrase that has become widely adopted to refer to employees who bring their own computing devices – such as smartphones, laptops, and PDAs – to the workplace for use and connectivity on the secure corporate network.” (Beal, 2014) This can cause increased security risks as there is no way for corporate IT to insure that the traditional protections methods are up to date and functioning properly or even installed at all. While it may be cost effective to allow employees to furnish their own
Open Document