Skip to main content

The Cloud Security Debate: Weighing Risks and Benefits

Integrated Protection System from PT SYDECO 

In a recent article dated December 2, 2023, Patrick Ruiz revealed a significant data breach at Okta, Inc., a San Francisco-based American company specializing in identity and access management software for businesses utilizing cloud-based services. This breach, combined with prior incidents like Google Drive's data loss, reignites concerns about the reliability of cloud service providers (1).

Ruiz acknowledges the undeniable advantages of Cloud computing: cost-efficient infrastructure maintenance, reduced energy consumption, rapid deployment of applications, and accessible backup solutions. However, he fails to address the associated costs.

Conversely, David Heinemeier Hansson of Basecamp disputes the cost-effectiveness of Cloud services. In October 2022, Hansson stated that Basecamp spent over $3.2 million in the Cloud, prompting their shift to on-premise hosting, a move projected to save $7 million over 5 years while only requiring a $600,000 investment in hardware amortized over the same period (2).

While Ruiz emphasizes Cloud benefits, he overlooks its glaring security concerns. These include weak access management, insecure APIs, system vulnerabilities, internal and external threats, data loss, and challenges in cost optimization.

Statistics from Check Point Research show a 48% surge in Cloud-based network attacks from 2021 to 2022, corroborated by Kaspersky's prediction that Cloud technology will become a prime target due to increased digitization (4, 5).

Apple's recent study, released on December 7, 2023, underscores the intensifying threat. With over 80% of breaches involving Cloud-stored data, and a staggering 2.6 billion records compromised in the past two years, the data security risks in the Cloud are alarmingly evident (6).

Considering these security risks, the article questions the perceived advantages of Cloud computing. Is it wiser, as Basecamp did, to invest in secure, cost-effective in-house solutions rather than entrusting sensitive data to external Cloud services?

Online File Sharing System from PT SYDECO

PT SYDECO's Integrated Protection System, encompassing NGFW ARCHANGEL©2.0, VPN Server and SydeCloud©, Online File Sharing System, offers an enticing alternative. By housing data and security infrastructure within the organization, it ensures a controlled environment for data processing, storage, and transmission without relying on external intervention (7).

In conclusion, while Cloud computing presents undeniable benefits, the escalating security risks prompt a reevaluation of its true advantages against in-house solutions. The choice between cost-effectiveness and data security remains a critical consideration for businesses in today's digital landscape.

(1) https://securite.developpez.com/actu/351414/Okta-une-entreprise-de-gestion-des-identites-et-des-acces-confirme-le-vol-de-toutes-les-donnees-de-ses-clients-par-des-pirates-et-ravive-le-debat-sur-le-risque-de-s-appuyer-sur-des-societes-Cloud/

(2) https://Cloud-computing.developpez.com/actu/340427/Basecamp-detaille-la-facture-de-3-2-millions-de-dollars-qui-l-a-force-a-abandonner-le-Cloud-l-entreprise-vise-a-reduire-sa-facture-de-depenses-en-2023-en-revenant-a-une-solution-sur-site/

(3)   Bill Fassinou, 23 ferier 2023, https://Cloud-computing.developpez.com/actu/341839/Le-directeur-technique-de-Basecamp-affirme-que-l-entreprise-economisera-7-millions-de-dollars-sur-5-ans-en-abandonnant-le-Cloud-au-profit-de-sa-propre-infrastructure/

(4) https://www.globalsecuritymag.fr/Check-Point-Research-fait-etat-d-une-augmentation-de-48-des-attaques-de-reseaux.html

(5) https://www.globalsecuritymag.fr/Kaspersky-Quelles-menaces-pour-les-entreprises-en-2023-Chantage-mediatique.html

(6) https://www.apple.com/chfr/newsroom/2023/12/report-2-point-6-billion-records-compromised-by-data-breaches-in-past-two-years/

(7) https://www.syde.co/products/the-archangel/

#Cloud #cybersecurity #security #archangel #ptsydeco #data #network #NGFW #VPN #sydecloud

Comments

Popular posts from this blog

KEUANGAN & DATA PRIBADI PEMAIN GAME ONLINE DALAM BAHAYA

Melindungi Gamer Online: Memahami Risiko dan Solusi Dalam beberapa tahun terakhir, dunia game online telah mengalami pertumbuhan eksponensial, sejalan dengan meningkatnya nilai aset game. Namun, lonjakan popularitas ini juga membawa segudang risiko yang mengancam para pemain dan operator. Dari upaya peretasan dan pencurian akun hingga transaksi yang tidak sah dan eksploitasi data, bahaya yang mengintai di dunia digital selalu ada. Mengingat tantangan-tantangan ini, sangat penting untuk menjelaskan pentingnya langkah-langkah perlindungan yang kuat dan solusi inovatif. Memahami Lanskap Aset game, yang terdiri dari mata uang virtual, item, dan akun, adalah sumber kehidupan ekonomi game online. Nilainya melampaui ranah virtual, bahkan sering kali melampaui transaksi di dunia nyata. Meskipun demikian, perlindungan konsumen tradisional yang diberikan oleh layanan perbankan dan pembayaran tidak ada di ranah game. Operator platform game sering kali mengadopsi pendekatan laissez-faire, membuat ...
 Hospital Security in Question In a recent article titled "Cyberattacks: Public and Private Hospitals, Is the Worst Yet to Come?", Jean-Michel Tavernier1 provides a detailed analysis of why the medical sector is a prime target for hackers. He highlights the vulnerabilities that allow hackers to access sensitive data such as medical records, insurance information, and payment details. The compromise of this data can have severe consequences for individuals' privacy, financial security, and even personal safety, not to mention the financial damage to institutions and the risks to the quality of care provided to patients. System Vulnerabilities Tavernier points to the "excessive interdependence of the entire healthcare chain." Hospitals collaborate with a multitude of interconnected providers and partners, creating numerous opportunities for attackers. He suggests managing the attack surface (ASM), which means controlling and securing all entry points where unautho...
                                                                     ERRARE HUMANUM EST   The Inescapable Nature of Human Error and Its Implications in Cybersecurity To err is human; one could even say it is a defining characteristic of humanity. Who has never made a mistake, whether out of distraction, ignorance, or because it was provoked? No one is immune to making mistakes, and most of the time, they are forgivable, even if their consequences can be very damaging. However, the fundamental, unforgivable error is doing nothing to avoid situations that lead to mistakes. Thus, to minimize errors due to distraction, one should avoid multitasking (for example, a surgeon operating should not be distracted by a nurse recounting her latest adventures) and refrain from performing actio...