{"id":11151,"date":"2014-07-17T17:00:00","date_gmt":"2014-07-17T17:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3121513"},"modified":"2014-07-17T17:00:00","modified_gmt":"2014-07-17T17:00:00","slug":"strong-cloud-encryption-top-tips","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/strong-cloud-encryption-top-tips\/","title":{"rendered":"Strong Cloud Encryption Top Tips"},"content":{"rendered":"<p>In a post Snowden world it is clear that for cloud data security, we need strong encryption. When properly implemented, encryption in the cloud reduces risk to levels acceptable for sensitive data.<\/p>\n<p>There is no doubt data protection in the cloud computing era is never going to be a \u2018one size fits all\u2019 kind of a solution. It requires a 360-degree view of the company with 365-days a year dedication.<\/p>\n<p>The best place to start is with a risk analysis so you know what kind of data you have, its levels of sensitivity, who\u2019s using it, where it\u2019s used and stored, and how and where and over what technologies it\u2019s going to \u2018commute\u2019. You need to understand your company\u2019s data \u2013 in terms of technology and human weaknesses. Data should be unreadable to an attacker. It must be incoherent at all times to anyone other than you and your trusted personnel: while it\u2019s travelling \u2013 or you are; whether it\u2019s in transit, storage, stopping, or resting, data is safest in encrypted form.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3121513\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a post Snowden world it is clear that for cloud data security, we need strong encryption. When properly implemented, encryption in the cloud reduces risk to levels acceptable for sensitive data.<\/p>\n<p>There is no doubt data protection in the cloud computing era is never going to be a &lsquo;one size fits all&rsquo; kind of a solution. It requires a 360-degree view of the company with 365-days a year dedication.<\/p>\n<p>The best place to start is with a risk analysis so you know what kind of data you have, its levels of sensitivity, who&rsquo;s using it, where it&rsquo;s used and stored, and how and where and over what technologies it&rsquo;s going to &lsquo;commute&rsquo;. You need to understand your company&rsquo;s data &ndash; in terms of technology and human weaknesses. Data should be unreadable to an attacker. It must be incoherent at all times to anyone other than you and your trusted personnel: while it&rsquo;s travelling &ndash; or you are; whether it&rsquo;s in transit, storage, stopping, or resting, data is safest in encrypted form.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3121513\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-11151","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=11151"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11151\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=11151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=11151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=11151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}