To access this content fill in:

Information protection Why it matters
  • Using the cloud often implies trading security for convenience.
  • Some type of data is not allowed to be on the cloud.
  • The problems is that one becomes forced to trust many actors with your data.
  • HYKER provides a security layer making data content invisible from the cloud.
The cloud is great

The cloud has transformed the way we work. It’s cheap and its convenient. Most workflows we use every day includes the cloud, even for simple things like emailing. But some information is not allowed to be on the cloud, and most information would be better of not on the cloud. Actually, two thirds of IT professionals say security is their most significant concern while moving to the cloud according to forbes.

This is for good reason!

The cloud REALLY is just someone else’s computer

In the cloud, your information is stored on a computer not at all different from your own laptop. The major difference is that someone else owns and controls this computer. That someone else is a company with employees, many of which may access the computer as they please. Most likely this computer is shared by many such companies. These companies also install many programs on the computer to make their services work. Programs running on the computer are managed by additional companies that also are able to access your data.

Every person and thing in this scenario:

  1. Would be able to steal your data should they want to.
  2. Could be exploited by an attacker to enter the system.

Remember: the guard must seal all holes but the thief is happy to find one.

Data leaks are very bad

There is a saying that emails are less secure than posting letters. Letters are stolen one at a time and may be misused once or a few times by a single actor. A data leak will always be accessible and searchable by actors with malicious intent. Data leaks are one of the most expensive misfortunes that companies encounter.

Encryption is no guarantee that your information is secure.

In fact, the use of encryption says little about what and who your data is protected from.

Encryption is a pretty simple tool that my be used in several ways, the most common being:

  1. Encrypted connection
  2. Encrypted hard drive

These types of encryption protect your data against eavesdropping on the network and against thieves physically breaking in an stealing the cloud computer holding your data. There are very few data leaks happening that way. Most breaches happens through exploiting weaknesses in systems to gain access to the running service instance.The absolute majority of service providers use these and ONLY these ways of encryption. Many service providers actually prefers having the ability to extract information from your data.

Best of two worlds

A very healthy way of approaching the problem would be to assume that a cloud computer will be subject to a data leak. That, it is not a matter of if but when.

There is an information protection method that aligns very well with this approach.End-to-end encryption (E2EE) makes it possible to manage data in the cloud without exposing content to middlemen. This is possible because the service provider never possess the decryption key.

A well equipped E2EE solution offers the flexibility and accessibility of the public cloud, with the security of a private data center.HYKER is a pioneer in this field providing solutions based on Cloud Encryption.