Why LinkedIn’s breach heightens importance of cloud security

It has been a tough week for social networking site LinkedIn. Forced to admit that over 3 million passwords were cracked and nearly six million unique passwords were grabbed from the site it has left users feeling shocked and confused. It also should be seen as a powerful lesson to anyone who works in the Cloud about the importance of asking the right questions for security, making sure the data stored is as safe as possible. There’s no suggestion that LinkedIn has done anything wrong but if you’re offering cloud services to clients, whether as a reseller or through your business – say if you’re a web designer hosting websites through a Cloud Server – you need to be able to answer question about your own security.

Hosting websites or information about clients is an important responsibility. If it’s part of your business then knowing the security in place by your provider is vital.

Take the example of Virtual Cloud Servers. Each sits on a physical server with a variety of different customers using them for different reasons. Each has their own resources and requirements and the deals and relationship they have with Intrahost is unique.

As well as being able to provide hosting facilities that meet their requirements, an important element of any business, security is always one of the first questions that’s asked. Many think cloud hosting will not be as secure as having a traditional hardware server sitting in front of you. In fact a Cloud Server offers additional mechanisms for security. The physical servers are based in a data centre which has the usual security access requirements like password entry and CCTV to protect the infrastructure. Network based security, including firewalls, disk arrays and protecting from spam and viruses are especially important. Intrahost understands the significance of protecting data and sees its responsibility as paramount for preventing any access that’s not allowed. The network is monitored 24/7 to make sure that any access attempt is logged, dealt with, prevented and then system set in place to warn off a repeat attack. There is multi-layered authentication on our systems. These services essentially mean there is layer upon layer of security that makes the data that you store for clients as secure as it can be possibly be.

It can be easy for end users to dismiss the need for data security. However they do so at their own risk. A big loss of data can damage a reputation as well as causing frustration for clients and customers. It should always be part of the business you understand best and can ensure it meets the standards you set for you own business.