Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

ECC Cloud and Security

548 vues

Publié le

The cloud has been around for a while and is really starting to take off! Here are some thoughts on security that may be useful and help you get your head around your security exposure.

Publié dans : Technologie, Business
  • Soyez le premier à commenter

ECC Cloud and Security

  1. 1. Erlach Computer Consulting Serving Reno since 1998
  2. 2. A Little Bit About Erlach• Establish in April 1998• 7 employees (5 technical, 1 admin and Me)• Primary market Reno/Sparks• We provide the professional services needed to keep your network running smoothly, your data safe and your people productive.• We are your IT department
  3. 3. Security and the Cloud The Three Vectors for ThreatsThe Cloud Transit End User Devices
  4. 4. The Cloud• Defined: – Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). - Wikipedia
  5. 5. The Cloud• Issues – Data loss – Improper Access – Privacy (http://www.youtube.com/watch?v=TDbrX5U75dk) – Ownership – Physical Security
  6. 6. Transit• Defined: – Data as it travels from a network node (E.g. End User Device) to another network node (E.g. The Cloud or another End User Device).
  7. 7. Transit• Low risk of data theft, loss or corruption.• Data at rest is more at risk than data in transit.• Higher risk of interruption and downtime.
  8. 8. End User Device• Defined: – These are the devices that the end user employs to access, manipulate and update data. – PCs, Smart Phones, Tablets – Also watches, game stations, blu-ray players, etc…
  9. 9. End User Device• This is the area of highest risk, and for which you have the most control. – Passwords/Passcodes – Encryption – Recovery and wipe tools – Company culture – Anti-virus/anti-malware
  10. 10. Additional Resources• ABCs of Cloud-Based Security• How To Encrypt Your Smartphone• www.icloud.com• www.avgmobilation.com• www.LocateMyDroid.com• www.windowsphone.com• www.sharefile.com• Gmail Man on Youtube
  11. 11. Erlach Computer Consulting• 8545 Double R Blvd., Ste 103• Reno, NV 89521• 775-332-3282• www.erlach.com• An IT Management Firm