Skip to main content

The Cloud Security Debate: Weighing Risks and Benefits

Integrated Protection System from PT SYDECO 

In a recent article dated December 2, 2023, Patrick Ruiz revealed a significant data breach at Okta, Inc., a San Francisco-based American company specializing in identity and access management software for businesses utilizing cloud-based services. This breach, combined with prior incidents like Google Drive's data loss, reignites concerns about the reliability of cloud service providers (1).

Ruiz acknowledges the undeniable advantages of Cloud computing: cost-efficient infrastructure maintenance, reduced energy consumption, rapid deployment of applications, and accessible backup solutions. However, he fails to address the associated costs.

Conversely, David Heinemeier Hansson of Basecamp disputes the cost-effectiveness of Cloud services. In October 2022, Hansson stated that Basecamp spent over $3.2 million in the Cloud, prompting their shift to on-premise hosting, a move projected to save $7 million over 5 years while only requiring a $600,000 investment in hardware amortized over the same period (2).

While Ruiz emphasizes Cloud benefits, he overlooks its glaring security concerns. These include weak access management, insecure APIs, system vulnerabilities, internal and external threats, data loss, and challenges in cost optimization.

Statistics from Check Point Research show a 48% surge in Cloud-based network attacks from 2021 to 2022, corroborated by Kaspersky's prediction that Cloud technology will become a prime target due to increased digitization (4, 5).

Apple's recent study, released on December 7, 2023, underscores the intensifying threat. With over 80% of breaches involving Cloud-stored data, and a staggering 2.6 billion records compromised in the past two years, the data security risks in the Cloud are alarmingly evident (6).

Considering these security risks, the article questions the perceived advantages of Cloud computing. Is it wiser, as Basecamp did, to invest in secure, cost-effective in-house solutions rather than entrusting sensitive data to external Cloud services?

Online File Sharing System from PT SYDECO

PT SYDECO's Integrated Protection System, encompassing NGFW ARCHANGEL©2.0, VPN Server and SydeCloud©, Online File Sharing System, offers an enticing alternative. By housing data and security infrastructure within the organization, it ensures a controlled environment for data processing, storage, and transmission without relying on external intervention (7).

In conclusion, while Cloud computing presents undeniable benefits, the escalating security risks prompt a reevaluation of its true advantages against in-house solutions. The choice between cost-effectiveness and data security remains a critical consideration for businesses in today's digital landscape.

(1) https://securite.developpez.com/actu/351414/Okta-une-entreprise-de-gestion-des-identites-et-des-acces-confirme-le-vol-de-toutes-les-donnees-de-ses-clients-par-des-pirates-et-ravive-le-debat-sur-le-risque-de-s-appuyer-sur-des-societes-Cloud/

(2) https://Cloud-computing.developpez.com/actu/340427/Basecamp-detaille-la-facture-de-3-2-millions-de-dollars-qui-l-a-force-a-abandonner-le-Cloud-l-entreprise-vise-a-reduire-sa-facture-de-depenses-en-2023-en-revenant-a-une-solution-sur-site/

(3)   Bill Fassinou, 23 ferier 2023, https://Cloud-computing.developpez.com/actu/341839/Le-directeur-technique-de-Basecamp-affirme-que-l-entreprise-economisera-7-millions-de-dollars-sur-5-ans-en-abandonnant-le-Cloud-au-profit-de-sa-propre-infrastructure/

(4) https://www.globalsecuritymag.fr/Check-Point-Research-fait-etat-d-une-augmentation-de-48-des-attaques-de-reseaux.html

(5) https://www.globalsecuritymag.fr/Kaspersky-Quelles-menaces-pour-les-entreprises-en-2023-Chantage-mediatique.html

(6) https://www.apple.com/chfr/newsroom/2023/12/report-2-point-6-billion-records-compromised-by-data-breaches-in-past-two-years/

(7) https://www.syde.co/products/the-archangel/

#Cloud #cybersecurity #security #archangel #ptsydeco #data #network #NGFW #VPN #sydecloud

Comments

Popular posts from this blog

QUIZZ

The 3 first ones who will give the right answers to the 10 following questions will win a Personal Firewall ARCHANGEL© PICCOLO   1.       What is the relation between the 3 background photos that are on the profile page of Mr. Patrick HOUYOUX President-Director of PT SYDECO? 2.        How many devices does the Firewall of Next Generation ARCHANGEL© 2.0 series SA1470 protect and how many secure tunnels does it create? 3.       What is the price of a one-year licence that a user of ARCHANGEL© PICCOLO will have to pay to continue protecting his or her IT installations from the second year onwards? 4.       What are the three programs which are housed in a single server that enable PT SYDECO's Integrated Protection System, to protect data at all times? 5.       Can PICCOLO protect a Smartphone? 6.       When (D/M/Y) did PT SYDECO signed a MOU with the Faculty of Engineering of University Gadjah Mada Yogyakarta? 7.    What are the three main features that make SydeCloud©, PT SYDECO'

A lesson in cyber safety

In an article published on 19 June 2023 in globalsecuritymag.fr/, Benoit Grunemwald, cybersecurity expert at ESET France, recounts the cyberattack suffered by REDDIT, an American social news aggregation, content rating, and discussion website, in February of the same year, and draws some lessons from it. This article follows the hackers' attempts, last repeated on 16 June, to obtain a ransom of 4.5 million dollars in order to delete the 80 GB of data stolen from the company, to which the company did not respond. The data was not encrypted, so the company did not lose it. However, the same cannot be said for its reputation.  Benoit Grunemwald explains that " It all started with a phishing email to harvest employee account data. All it takes is for a single employee to be trapped for cyber criminals to gain access to internal documents, software code, employee data , etc." He goes on to stress the " need to integrate in-depth security methods and resources, such as zer

IDS – IPS – DPI – FIREWALL

Understanding Key Elements of Cyber Defense Against Attacks  In the realm of network security, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Deep Packet Inspection (DPI), and Firewalls are vital concepts, each with distinct roles, functions, and purposes. This study delves into these components, their capabilities, and the significance of their integration in a holistic cybersecurity strategy. The landscape of cybersecurity hinges on the interplay of IDS, IPS, DPI, and Firewalls, each addressing different facets of network protection. This study elucidates their core functions, while emphasizing their symbiotic relationship within an efficient defense system. This while keeping in mind that the capabilities that will be described are those that each of the components should ideally have but whose effectiveness actually depends on the functions they are equipped with, the quality with which these functions have been created and the level of excellence with which