Cloud computing threats can be countered
New technology can counter the security risks posed by cloud computing.
Security issues with cloud computing have been highlighted by a US military science professor at the Defcon security convention recently.
In May, ISACA found that information security management, along with regulatory compliance and the challenges of managing IT risks, were uppermost in members minds when it comes to security in a poll.
Sarb Sembhi, president ISACA London Chapter, said: "Greg Conti pointed out that early examples of this technology, such as the simple web-based email services offered by Google and others, are difficult to secure when using standard web interfaces, but ISACA believes that, with the right technology, these problems can be solved.
"Clearly, cloud computing adds to these issues, but, with the right technology in place, ISACA believes that the security issues associated with this brave new networked world can be surmounted, even if the process takes a little time.”
Two-factor authentication systems, when married with encrypted VPN connections, can secure an Internet connection into a cloud computing-based service, making interception of files and transmissions almost impossible.
Sembhi said: "Whilst there is no such thing as a totally secure system, especially a system that is accessible across the Internet, our belief at ISACA is that, with the right technology, the new generation of cloud computing system can be made as secure - if not more secure - than existing server-based office systems."