Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC
For the past few years, data protection, encryption, and workload security automation have largely been add-on services in cloud systems. Cloud computing has been a core factor for many enterprises to transform their IT practices. However, even experts agree that the market is entering the second stage of public, private and hybrid cloud services. According to a Forrester Research survey, 38 percent of enterprise decision-makers said they are building private clouds, with 32 percent procuring public cloud services and the remainder planning to implement some form of cloud technology this year. The area of hybrid cloud is also heating up with a whopping 59 percent of respondents saying they are adopting the model.
While adopting new cloud strategies, always ensure to deploy private connectivity instead of a regular internet pathway to a cloud provider’s network. Meanwhile, safeguard the mobile endpoints with anti-virus and anti-malware applications. An EMM (enterprise mobility management) to track and disarm mobile devices that get stolen or lost will be an added advantage. In addition, encrypt the confidential information so that it will be safe in the event of a breach. Also, encrypt data whenever it’s on the move and subject to risks from packet sniffing programs and other interception tactics used by malicious hackers.