Intelligent Data Centres Issue 25 | Page 32

EDITOR S QUESTION
MATT EDGLEY , DIRECTOR , TELEDATA major benefit of cloud access is that it ’ s

A completely auditable , usually by default , via locations , usernames , IP addresses and so on . But the audit trail only gives you information following an access attempt or potential breach , so it ’ s important to ensure you have an embedded security awareness and understanding in your organisation .

Whether you ’ re choosing a cloud application , a cloud server for your own corporate use , or building a completely bespoke and complex environment in the cloud , make sure you have quizzed your provider about their own approach to the security of their customers ’ data and applications . No matter how important it is to you and your business , if you don ’ t have a secure platform to work and deliver your resources from , then you ’ re potentially overlooking the weakest link .
Take it right back to recruitment and recruit people that understand security . Always ask what potential new recruits ’ views and experience is regarding online security generally . You don ’ t expect experts as you should have them in place , directly or indirectly , but you can recruit the right mindset which is a major ingredient to effective security .
Working to standards such as ISO27001 – with simple , but vital policies such as User Access Reviews , password policies , BYOD policies , working from home policies etc . all help to educate your staff and encourage a greater awareness . If your employees don ’ t think you take security seriously , then why should they ?
Consider technologies such as remote desktop . By implementing a centrally hosted remote desktop solution , you can ensure exactly the same level of security wherever in the world your members of staff are . Security is centralised and less open to the individual , their home network security or the configuration of their home devices . With the centralised nature of the service , full logs are available should you ever need to investigate a security or data breach which would be far more difficult to investigate otherwise .
As a minimum , implement VPN access from company devices . And give out good quality devices that your staff will appreciate more and be more inclined to use . Poor devices will mean that users start to access from their preferred home device if they can , and you end up with rogue and potentially vulnerable personal devices accessing business critical data and applications . ◊
Content supplied by the DCA
32 www . intelligentdatacentres . com