Moving to the Cloud and Need to Protect Sensitive Financial Data? Infinitely Virtual CEO Offers Tips, Insights on Staying Safe and Secure
SANTA MONICA, Calif. (June 4, 2012) – Among small and mid-size businesses, the refrain is increasingly familiar: “We’re responsible for sensitive financial data, and our customers trust us to protect it at all times. We want to move to the cloud but have concerns about the risks in handing this data off to another company. If we make the switch, how can we be certain our data will be protected?”
According to Adam Stern of Infinitely Virtual, a leading provider of virtual server cloud computing services for growing companies, the rationale for migrating to the cloud is sound, the questions are valid, and the answers are becoming ever more straightforward.
“Cloud computing offers small businesses a cost-effective means of hosting large amounts of data without having to invest in hardware that is expensive, and all too soon, obsolete,” Stern says. “And businesses need to feel comfortable they have the highest level of security when entrusting their data to a cloud computing provider.”
WHO: Adam Stern is an entrepreneur who saw the value of virtualization and cloud
computing more than five years ago. Stern’s company helps businesses move from obsolete hardware investments to an IaaS [Infrastructure as a Service] cloud platform, providing them the flexibility and scalability to transition select data operations from in-house to the cloud. Stern founded Infinitely Virtual in 2007, to provide virtual dedicated server solutions to growing enterprises. The company has grown exponentially through its offering affordable, customized cloud-based solutions, using the most sophisticated technology available. Host Review named the company to its list of “Top Ten Fastest Growing” enterprises in 2011. More information about Infinitely Virtual can be found at: http://www.infinitelyvirtual.com or by calling 866-257-8455.
WHAT: Stern has itemized a series of tips for any company moving to the cloud, as a way to confirm that the host provider has a top-notch security system in place. .
WHY: According to Stern, following these insights will enable companies to maintain peace of mind throughout the process, confident that business-critical data is fully protected:
o Firewalls are just the start. Good cloud security platforms are based on an intrusion detection and prevention system (IDPS) that is able to detect threats beyond the firewall, identifying threats to your data that even the best firewall won’t catch.
o Create a baseline for “‘normal” traffic. Your security platform should “learn” what normal network traffic looks like for your business, and therefore be able to spot abnormal traffic that could signal malware threats.
o Your data stays yours alone. To prevent contamination from any other system’s data, the servers hosting your data in the cloud need to be placed in “virtual local area networks” (VLANs). Think of a VLAN as your privately guarded data garage – only your data is allowed in and out.
o Secure those backups. The most secure data restoration – in the event of data loss – is called “‘application-consistent backup.” This means your provider has taken point-in-time snapshots of your data, enabling fast, clean restoration – without tape. The method avoids data corruption and is the fastest means of getting you up and running, while minimizing downtime.
o Know your provider. The people managing your cloud computing service are also critical to keeping your data secure. Make sure they are well trained and knowledgeable, and can give you the 24×7 technical support you need. With cloud hosting essentially being an “outsourced” service, it is important you have full confidence in your provider.
o Train your team. Equally important is having your internal IT staff completely on board as you transition to cloud computing. Your staff should have the cloud host’s technical support contact information and website before moving data to the cloud. They should be familiar with the security system the cloud host uses to protect your company’s data, in the event any system issues arise.
HOW: To speak with Adam Stern, contact Ken Greenberg, Edge Communications, Inc.,
323-469-3397, or email firstname.lastname@example.org.