Using the Key to Unlock Your Cloud Encryption Strategy

In 2014, WinMagic surveyed over 200 IT decision makers, asking about their company’s cloud storage policy…Here’s what we found:

-48% of IT decisions makers only allow the use of a cloud storage solution that the company has implemented.

12 months later, we surveyed over 2,000 adult consumers, 18 and older, about their confidence level in storing personal data to the cloud – here’s what they told us:

-76% of consumers are confident in the security of data both saved and accessed to and from a cloud storage service.

What do these two data points show us? That regardless of high-profile breaches on unencrypted data in the cloud, consumers aren’t losing any sleep at night about their personal information stored in DropBox. However, it does show us that IT decision makers know better and understand the repercussions of storing unprotected corporate (and personal) data in the cloud by only allowing for company-mandated storage solutions to be used.

The current state in understanding cloud data security is a bit foggy – consumers aren’t fully aware of the potential risk involved. That’s why we here at WinMagic are taking it upon ourselves to educate the masses on why encrypting your data before it makes its way to the cloud is vital to a sound security strategy. When it comes to cloud data encryption, it’s all about key management.

The challenge in today’s market comes down to who owns access to the encryption key. For those looking to secure their data in the cloud the smart way, make sure a solution is intact that will grant users full access to their encryption key. As long as the key is managed within the enterprise, and not by the external cloud providers, a user’s data will be rendered useless (i.e. encrypted) to a cyber-criminal looking to access sensitive information if the cloud is breached.

If you’re interested in learning more about the importance of data encryption as it relates to the cloud, feel free to reach out to a WinMagic representative.

Previous Post
Where There Are Clouds, There Could Be Rain
Next Post
Medical Fraud Is More Than Just a Breach

Related Posts

Apple’s Privacy Policy

Apple’s new privacy policy allows the user to encrypt emails, contacts, and photos that uses a code that the user has created. Not even Apple will have access to this code. This gives sole power over iPhone’s personal data to…

A Long Ride for Stolen Data

Have you ever wondered what happens to your data once a thief gets their hands on it? Bitglass, a cloud security company conducted an experiment to find out just what happens when data has been stolen. And the answer may…
Read more
network security

4 Myths About Network Security

When you hear the words “network security,” what comes to mind? Do you believe your network is invulnerable against any threats? And do you think it’s something you don’t need to worry about? If that’s the case, keep reading. This blog…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
Contact Us

This will close in 15 seconds