Your IT Support Experts - Homepage

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.

Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

(703) 359-9211

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

Macro Systems Blog

Macro Systems has been serving the Metro Washington, DC area since 1997, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

How Smart Businesses Keep Their Cloud Data From Falling Into the Wrong Hands

b2ap3_thumbnail_network_access_400.jpgCloud computing is a normal part of today’s business landscape. In fact, in a recent poll of IT and business executives by Harvard Business Review and Verizon, 84 percent of respondents said they increased their use of cloud services in the past year-- 39 percent of which “increased significantly.” However, with more users accessing cloud data, business owners must be mindful of employee permissions.

This kind of security oversight is known as role-based access control. While role-based access control has always been a major component of network security, for some reason (perhaps due to the cloud’s ease-of-use), user permissions can be overlooked when it comes to cloud computing.

With a traditional, in-house IT infrastructure, user permissions and other aspects of network security are overseen by an in-house IT staff member or your trusted IT guru. The advantage of having an in-house network is that your IT technician is familiar enough with the company to know who the users are, along with their roles within the organization (this is especially the case for SMBs). With cloud computing, security oversight is often outsourced to the cloud provider, who may not know every user or understand what their roles are within your company’s organizational structure.

To be clear, we’re by no means advocating against outsourced network security. Instead, we want to raise the concern of not blindly rushing into a cloud computing service without first properly vetting its security measures. For example, you’ll want to make sure that your cloud computing solution gives you enough control that you can implement different levels of access to sensitive data based on the roles within your company. Doing so will require you or an administrator within your company to set these parameters, or maintaining a relationship with your cloud provider so they can understand the role-based access control needs of your business.

NetworkComputing explains:

When you have employees with different roles in your company, access control is a key feature that can help ensure basic cloud administrative security. You’ll need to exercise caution to prevent credentials from being compromised, and to ensure menial errors don’t spoil your day. Implementing robust and powerful access control is important to protect company resources.

Additionally, you’ll want to implement ways for the information that one’s granted access to (due to their role) to only be seen by them, and not shared with others who have no business accessing it. For example, in-house IT workers have access to more information than the average worker, much of which is sensitive in nature. Despite this, according to a recent study by Intermedia and Precision Sample, IT workers are 10 percent more likely than non-IT staff to give away their login credentials for superfluous reasons.

What precautions do you have in place to prevent scenarios like this from happening? One extra layer of protection you can add to your cloud service is two-factor authentication. This will mandate another form of authentication, like a text message or phone call, in order for the user with the proper role to access the information they need. A security solution like this will make it much more difficult for a user to exchange account information with those outside of their roles.

The many benefits of cloud computing are obvious, which is why enterprise-level cloud services are growing so rapidly. The best approach to cloud security is to understand the intricacies of the services you’re using, as well as to lean on a cloud service provider that you can trust. To that end, Macro Systems is here to assist your business with all of its cloud computing needs, including the management of who in your organization can access your cloud data, and who can’t.

For something as important as managing your cloud, wouldn’t you want to trust an Metro Washington, DC-area company that you have easy access to? To find out how we can provide your business with the most secure cloud services possible, give us a call today at (703) 359-9211.

Tip of the Week: Save Precious Seconds With Your M...
Why Google Fiber is a Game-Changer for the Interne...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, November 21, 2024

Captcha Image

Customer Login


Contact Us

Learn more about what Macro Systems can do for your business.

(703) 359-9211

Macro Systems
3867 Plaza Drive
Fairfax, Virginia 22030