The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
GET RECOGNIZED
Let an ISACA® certification elevate your career.
Register today and save
You are here: Home / EST Press Releases / Data Security and Cloud Computing
DDoS Protection Powered By Verisign
Data Security and the Cloud: Get Up to Speed
Data Security and the Cloud: Get Up to Speed
News as reported by the company Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
26
2012


NEW YORK, March 26, 2012 -- Most people are wary of electrical devices that don't carry a seal of approval from Underwriters Laboratories, or a bank that isn't FDIC insured. Wouldn't it be great if there was something similar that businesses could rely on when choosing a cloud computing vendor?

With the marketplace still evolving, however, there isn't a single "thumbs up, thumbs down" standard for cloud security. Yet business technology leaders still have to make the right call on outsourced IT vendors and the integrity of data centers they use to deliver information to the cloud. The dilemma: many decision-makers are unfamiliar with or lack confidence in choosing the best services to make those assessments.

To address this need, the American Institute of CPAs has developed a series of services for data centers that, once completed, lead to documents called Service Organization Control (SOC) ReportsSM. SOC 1SM reports refer to controls of centers that impact customers' internal controls over financial reporting, while SOC 2 SM reports cover system reliability criteria, including data security, privacy, confidentiality, system availability and operating integrity. A SOC 3 SM report, meanwhile, is a short-form version of the SOC 2 report and the only one of the three that's designed for public consumption.

Making sure a vendor uses data centers that have gone through the proper audit engagements is critical for businesspeople who plan to use cloud-based services. Information security is the leading IT concern for small firms and large companies alike, according to the recent 2012 Top Technology Initiatives Survey by the American Institute of CPAs. Yet survey takers, speaking on behalf of their firms and clients, said they felt less confident about correctly using SOC reports than they did almost any other technology priority.

What should decision-makers do to make the right choices? Here are some tips:

  • Don't assume all cloud vendors are created equal. Security precautions can vary widely.
  • Question the credibility of firms that use inaccurate terms. Many vendors tout their data centers as "SAS 70 certified." But SAS 70 is an AICPA audit standard that has been superseded by SSAE 16 (which is covered by a SOC 1 report), and there is no such thing as a uniform certification process in this area.
  • Ask for SOC 3 reports, where available, and whether a SOC 2 engagement has been performed. If a vendor doesn't have one, make sure you understand the degree to which the firm uses encryption, storage redundancy, password rotations and robust physical security so you can gauge how well your data will be protected.
  • Make sure you have clear remedies spelled out if you suffer outages, data breaches or other issues regarding your critical business information.
  • Learn more about SOC reports and other security standards. For CPAs and other financial professionals, the AICPA has an array of publications, webcasts and study courses available on the topic.
(continued...)

1  |  2  |  Next Page >

Tell Us What You Think
Comment:

Name:

Scott:

Posted: 2012-03-28 @ 10:56am PT
Something else that should be considered is ISO 27001 or FedRamp for Cloud Security. You can read about both on our website. http://www.pivotpointsecurity.com/risky-business/egovernment-cloud-security-fedramp

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN EST PRESS RELEASES
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 
Who Is the Hacker Group Lizard Squad?
Are they dangerous or just obnoxious? That’s what many are wondering about the hacker group Lizard Squad, which tweeted out a bomb threat that grounded a flight with a Sony exec aboard.
 

Enterprise Hardware Spotlight
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
 
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 

Mobile Technology Spotlight
Samsung Maps Its Way with Nokia's 'Here' App for Galaxy Phones
Korean electronics giant Samsung has opted to license Here, Nokia’s mapping app -- formerly known as Nokia Maps -- for its Tizen-powered smart devices and Samsung Gear S wearable.
 
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
 
Visual Search To Shop: Gimmick or Game Changing?
Imagine using your phone to snap a photo of the cool pair of sunglasses your friend is wearing and instantly receiving a slew of information about the shades along with a link to order them.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.