Can your company afford to lose $400 million?

MonitoringIn terms of dollars and cents on a risk analysis spreadsheet, it is easier to put a value on a particular asset than the potential recurring value of a client, customer or even partner. Beyond lawsuits and capital and operational expenses to repair a mea culpa, weak cryptography, hack defenses or shoring an previously-undiagnosed vulnerability gap, the damage done to a brand because the user no longer trusts doing business with that company is staggering. Intrusion Security has a significant impact on customer retention.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

Do you want to know what you don’t know?

Too many IT departments take the stance of “I’ll worry about it when I have to worry about it.” Problem with security issues is, by then it’s too late. Often times maintaining the status quo is as dangerous as doing nothing at all.  It is truly unfortunate how many are lulled into a state of complacency.  The problem with IT security is that it’s an ever-evolving and moving target. And to take a step forward, you must recognize what you know and what you don’t.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

FFIEC’s recognition of cloud security advantages is good for modest financial orgs

How credit unions, smaller banks can now use outsourcing for compliance using security-as-a-service. Last month the Federal Financial Institutions Examination Council (FFIEC) shared an opinion on the viability and security of cloud computing. In the four-page statement, the interagency body empowered to prescribe uniform principles, standards, stated that cloud computing is “another form of outsourcing with the same basic risk characteristics and risk management requirements as traditional forms of outsourcing.”

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

 

 

Do you leave your keys in the car too?

I heard the sky was falling. Well, at least the cloud was plummeting groundward. And all it took was one tech journalist to get his iCLoud account (and essentially his entire digital footprint) hacked. Several well-known tech-heads have added their voice to chorus of cloud-bashers. There are a couple reasons why this latest round of Chicken Little prognostications are baseless. Bottom-line, security is only as good as its process. Whether it is cloud-based, or is created to protect assets in the cloud, if you are not minding the store, candy will get stolen.

READ THE ENTIRE ARTICLE FROM THE NEW CLOUD ACCESS BLOG SITE: HERE

The DNA of Cloud Security

Just because you access an application from the Internet, does NOT make it a cloud solution. It might look like a duck and quack like a duck, but when you look at its DNA, it’s more like an old goose. So what?  If it doesn’t have the proper “cloud DNA,” it means the end user organization is not realizing the oft-hyped benefits and true ROI the cloud promises.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

A preposition makes all the difference in/of/for/from the cloud

With all the important decisions IT departments make, what’s the big deal whether cloud security means from the cloud, in the cloud, of the cloud or for the cloud. Well, a lot. Amongst the various media, blogs, conferences and the like, the concept of cloud security is getting a significant amount of airplay. However, the difference in the application of a simple preposition completely alters the scope and meaning of these conversations to that of a problem or a solution.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

Are the costs of cloud security to good to be true?

The costs of holistic security are very different from company to company when considering direct costs, soft costs, hidden requirements, scope of services, and migration issues. Yet when comparing cloud apples to cloud apples we can show you how to do more with less. What makes cloud security compelling is how the costs break down in terms of hard and soft cost savings.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE