Cloud Security Practices Fail to Keep Pace with Cloud Adoption; Companies at Risk


Welcome to the Wednesday edition of the IP news roundup. Here are the latest headlines in cloud, unified communications and more:

  • Although most companies now allow their employees to use cloud services to access corporate data, a recent Symform survey revealed that 20% of businesses have no clear cloud security policies. According to eWeek.com, “Survey results indicated that for many businesses, data growth is outpacing cloud adoption. Coupled with the rise of bring-your-own-device (BYOD) initiatives and the consumerization of IT, the survey suggested many businesses are slow to acknowledge cloud adoption within their organizations. As a result, these companies are unable to determine the proper IT security and policies to govern this cloud usage.” The inability for companies to align their security policies with actual cloud usage can eventually lead to increased risks.
  • A Cisco study revealed that unified communications (UC) can lead to economic growth, but only if collaboration technologies work together.The paper, written by Dr. Michael Katz and Dr. Bryan Keating, outlines the “potential negative outcomes for the market if some UC vendors refuse to adopt industry standards that would enable video-to-video calls between different commercial and consumer systems.” According to Keating, “As with the Internet, we can’t afford to have a ‘go-it-alone’ mentality in this area. We must do everything we can to ensure that companies adhere to the common global standard for video calling so that businesses and consumers reap the full benefits of these compelling communications platforms.” The authors believe the government should monitor the UC market for anti-competitive conduct and ensure companies are adhering to industry standards.
  • Megaupload case puts the focus on cloud privacy. Individuals who have uploaded personal videos and other files to Megaupload are in a legal battle to retrieve their content. When the site, which contained content that the US government believes broke copyright laws, was shut down, its users lost access to their data. An article on Wired.com stated, “So far, federal prosecutors are proposing a process that would make it essentially impossible for former Megaupload users to recover any of their legitimate data.” This raises the question of how secure your data is in the cloud. See the Wired.com article for more information on Megaupload and cloud privacy.
  • And finally … a Pennsylvania software developer couldn’t troubleshoot a faulty electronic voting booth, but he did bring it to the world’s attention. Yesterday, an anonymous voter made news as he caught an electronic voting machine changing votes for Obama into votes for Romney. “Being a software developer, I immediately went into troubleshoot mode. I first thought the calibration was off and tried selecting Jill Stein to actually highlight Obama,” he stated. However, “Stein’s button was fine. All other buttons worked fine.” He then used his phone to record a video of him pressing the Obama button only to have the Romney button light up. After posting the video to YouTube, his story garnered international attention, and the voting machine was taken out of commission. Experts later determined that it wasn’t a case of election fraud but, as the IT professional predicted, a calibration problem.    

What is your take on today’s news? Feel free to share your opinions below.

Comments are closed.