Top 7 Cloud Security Questions Answered

Cloud SecurityQuestion: What if my Internet connection goes down for an extended period of time?
Our Answer: While this is a valid concern, TOSS C3 offers a service called WAN-UP™ which takes two or more wired and or wireless internet services from different providers and connects them to the supplied 24/7 managed appliance. Once connected, the appliance will aggregate the bandwidth giving you full usage of all bandwidth purchased. In the event of an internet line failure, the appliance automatically routes your access to another available line. The result is super-fast access when all lines are up and not losing access if one internet line goes down. You can connect from 2 to 26 separate internet lines with WAN-UP™.

Question: What happens if we lose power or can’t get to the office, how can we continue to work productively?

Our Answer: One of the many problems our IT as a Utility® cloud offering solves, is continuous access from any device and from any location. Since you’re IT infrastructure is liberated from your office, power outages, building shutdowns, storms, and other mishaps have zero impact on your IT system. This allows you and your staff to use any device that can get an internet connection and securely login into your IT as a Utility® system enabling you to conduct business as usual with no diminishment of service.

Question: What about security? Isn't there a big risk of someone accessing my data if it’s in the cloud?

Our Answer: In many cases, cloud computing is a MORE secure way of accessing and storing data. Just because your server is onsite doesn’t make it more secure. In fact, most businesses can’t justify the cost of securing their network the way a cloud provider can. Most security breaches occur due to human error; one of your employees downloads a file that contains a virus, they don’t use secure passwords, or they simply e-mail confidential information out to people who shouldn't see it. Other security breaches occur in on-site networks because the company didn't properly maintain their own in-house network with security updates, software patches, and up-to-date anti-virus, and firewalls. That’s a FAR more common way networks get compromised verses a cloud provider getting hacked. At TOSS C3, we use clusters of highly available firewalls, intrusion detection systems, and 2-factor authentication is available as an option. Additionally, all data at the production and Disaster Recovery facilities is encrypted both at rest and in-flight.

Question: Can someone tap into my cloud connection and read my email or get my data?

Our Answer: Most providers have some form of encryption for your cloud connection that prevents this from happening. Your connection to TOSS C3’s IT as a Utility® completely mitigates this by keeping all of the data, applications, and processing securely in the cloud data centers so your connection has no information within it other than video signaling, sound, keyboard strokes, and mouse movements. When you do download or print a file, the data is encrypted prior to sending it to you and the entire time it takes to get to your device, so security is not an issue.

Question: What if WE don’t like the cloud? How do I get my data back?

Our Answer: We give every client detailed information that clearly outlines where their data is and how they could get it back in the event of an emergency. This includes emergency contact numbers, information on how to access your data and infrastructure without needing our assistance (although we are always available to support you,) and information regarding your backups and licensing.

In fact, you should never hire ANY IT professional that won’t give you that information. We also have the ability, with our vBCDR® system, to replicate your data every day to your office so you have a physical copy and back up of your entire network to guarantee that your applications, servers, and data are always accessible by you. vBCDR®, which stands for Virtual Business Continuity and Disaster Recovery, is a patent pending system TOSS C3 developed in conjunction with DELL and is a robust optional service.

Question: Do I have to purchase new hardware (servers, workstations) to move to the cloud?

Our Answer: No! That’s one of the best benefits of cloud computing. It allows you to use older workstations, laptops and servers because the computing power is in the cloud. Not only does that allow you to keep and use hardware longer, but it allows you to buy cheaper workstations and laptops because you don’t need the expensive computing power required in the past. Ninety-nine percent of our clients use their existing equipment or low-cost laptops, and those who add additional systems, usually purchase cloud terminals, which are very low-cost purpose built appliances that boot directly into the cloud.

Question: What if the PC or Laptop I use to access the cloud dies, then what?

Our Answer: The beauty of the cloud is that you can use any device as an endpoint. We recommend that our clients keep one or 2 low-cost systems on hand to swap out dead or crashed systems. Of course, you can always pop down to Staples or Best-Buy and purchase a low cost PC or laptop in a

To learn everything you need to know about the cloud including whether it is right for you, click below

To learn more check out our free cloud report here!

Leave a comment!

You must be logged in to post a comment.