Staying Safe When Utilizing Cloud Storage

CloudWhen it comes to data storage, many enterprises are finding better accessibility and cost savings in the cloud compared to on-site servers. If you have yet to make that move, it’s likely one of your chief concerns is the safety of your data. If so, you’re not alone.

Safety and security are the top talking points for those who haven’t embraced cloud-based solutions. However, large cloud providers are extremely vigilant when it comes to security. The resources available to large providers far exceed what even medium-sized organizations are able to produce on their own, making cloud options even more secure than keeping things in-house.

One area that still remains a challenge with security is that encrypted storage isn’t 100% impervious to attack, especially if drive-based encryption is used, and there is evidence that automatic encryption practices can be vulnerable to attack. Encrypting a server with a custom key set is the way around this issue. What other ways can you protect your data?

Protect Against Damage and Deletion
If you’ve taken every step to fully encrypt your data, it’s still vulnerable to damage or deletion if hardware failure occurs. Bad software and malicious operators can also make your data vulnerable.

If you move data to an area where it can’t be compromised, you will ensure your data is more secure. Protect data from exposure through frequent backups and by making offline copies.

Be Diligent About Management
Make sure you’re partnering with a data center that doesn’t have chaotic data management practices. They should be experts at managing partial datasets and trash. Critical files should never be allowed in low-security areas, and they should practice a metadata-driven approach that offers greater control.

Be Careful of Your Insiders
Did you know the majority of data losses have been at the hand of an insider? These are people whom you’re trusting with your data. Protect yourself by using multi-factor authentication. This may seem like too much of a time investment, but it’s not as much as the time lost in the wake of a data breach.

Human error is also a cause of data loss. Know the common mistakes and develop a strategy for when they occur in order to remain proactive rather than reactive.

At Focal Solutions, we invest in our clients by offering comprehensive solutions. For cloud services, our clients have confidence in our data center solutions and disaster recovery strategies. Contact us today and find out how seriously we take the safety of your data.

The Move from Centralized WAN Design

WANThe design for wide area network (WAN) is currently adapting to new requirements for networks, so the typical hub-and-spoke configuration is making way for other alternatives. There are many factors driving a change in WAN design, but two have had the most impact:

  1. The migration to cloud software for applications and data storage
  2. Software as a Service (SaaS), cloud-based apps, and managed services all require a WAN configuration that reduces latency and improves speed and performance

With the need for quicker connections and better performance, there are currently three main designs for WAN:

  • Centralized internet access (in this case, firewalls, authentication, and other security features are in the single WAN access point)
  • Decentralized internet access (this is known as “every site for itself”)
  • Regionalized internet access

Overall, the trend is moving away from a centralized design, except in those cases where a company is geographically localized and is primarily using on-site software solutions.

The Implications of a Decentralized WAN Design

While it’s easy to understand the desire for a direct connection to the internet for branches to increase speed and efficiency and improve business processes, a decentralized WAN design presents other challenges for IT teams. Managing security and firewalls is more difficult and expensive when there are multiple entry points for accessing the internet.

A centralized WAN design has some benefits when it comes to security, including the requirement for all traffic to back-haul to your centralized network before going out to the internet.

Regionalization

Many enterprises are adopting what’s called regionalized internet access, in which they gain some of the benefits of centralized and decentralized designs. In this model, there are generally two variations used: hub routers in colocation sites or virtual hub routers in the cloud.

One benefit of using hub routers in the colocation sites is that end users appreciate a fast connection to the internet with an inexpensive price tag. The alternative is simply the virtual equivalent of this system, with virtual hub routers in the cloud. There are a few challenges for this method, including limitations in performance, the ability to access inter-cloud provider connections, and potential fees for egress traffic from cloud providers.

With a regional connection, you still have some of the latency that comes with a centralized WAN design, but it’s spread out between multiple locations. As a result, speed is not as big of a problem and performance is reliable.

As comprehensive consultants, Focal Solutions works with you through every step of your technology plan, from choosing a network configuration to determining which applications are best hosted in the cloud. We’ll make sure speed and performance never suffer while reducing your overall IT costs. Give us a call to talk more.