The Silver Lining In Your Cloud TM

How Secure Are Your Cloud-Based Business Applications?

For many businesses, using cloud-based business applications is a great way to drive operations.

Cloud-based services offer convenience of sharing information and scalability, without the need for heavy investments in hardware.

However, there’s always the question of: “how secure are your business applications?” The business-critical apps that your company runs in a cloud environment need to be secure to prevent data loss, breaches, and interruptions of service that can negatively impact business operations.

The Cost of Weak Protection

With some cloud solutions, weak protection can leave your critical business applications open to exploitation by hackers. The resultant data breaches and disruption in business could cost your company millions of dollars in damages.

For example, on CRN’s list of the 10 Biggest Data Breaches of 2015, a cybercriminal ring known as Carbanak managed to gain access to employee account credentials at over 100 banks, “then used those credentials to make fraudulent transfers and make hijacked ATM machines appear legitimate as they funneled more than $1 billion into their own pockets.”

Even spread out amongst 100 banks, a loss of $1 billion is significant. Worse yet, such a breach can cause a loss of confidence among consumers, leading to depressed sales as customers avoid the company for fear of a data breach harming them directly.

In short, having weak security for your company’s business applications can hurt, so it’s important to have strong security with multiple layers that can limit the chance and impact of a breach.

ALSO ON Why Layering is the Best Approach to Cloud Security

Keeping Business Apps on Lockdown

So, how can you make sure that your business applications are secure?

One way is to use a secure cloud service that offers a strong, multilayered approach to security to protect your business’ important information. This involves having both powerful online security measures and strict physical security for the servers that run your applications.

For example, do you know the location of the server that your business’ apps are run on? Is your cloud server kept safe in a Tier IV data center with armed security patrols, or is it in the back of a strip mall office with only a simple door lock between your most sensitive data and the rest of the world?

With weak physical security, a thief could simply stroll into your cloud provider’s server farm and walk off with the server, and all of your company’s information. This is one reason why only partners with Tier IV data centers.

Tier IV data centers such as the NAP of the Americas employ rigorous security measures including, but not limited to:

  • CCTV security monitoring
  • Armed security patrols
  • Key card access to elevators, floors, and roof areas.

A tier IV data center keeps the servers that run your business’ applications on lockdown, protecting your company’s most sensitive information.

Online Security That Keeps Your Applications Safe, But Available

As important as the physical security of the servers that run your business applications is, it would be meaningless without an equal amount of data security to protect the information and applications on the server from online threats.

Best in class cloud service providers use multiple firewalls to keep hackers out.

For example,’s secure cloud offerings come standard with perimeter, host-based, and per-tenant firewalls from industry leader Palo Alto Networks to keep out external threats, and to reduce the impact of threats that originate from within the system by restricting access.

Think of it kind of like a prison structure for your data: there’s the outer wall or fence, a reinforced cell block, and then there are the individual cells that each prisoner (app) resides in. If someone were to bust one of the cells open, the other cells would remain secure, and the outer wall would still be there to prevent further intrusions.

Keeping data on the server encrypted with a strong encryption key helps ensure that even if thieves do manage to retrieve some data, they won’t be able to read it right away. Adding antivirus software to detect and destroy malware programs further helps to increase the security of your critical business applications.

However, you still need to be able to access your business apps when you need them. This is why server uptime and availability are important. Thankfully, tier IV data centers excel at providing strong uptime.

For example, as cited by, a tier IV data center must provide “99.995% .” This means that, out of a 365-day year (or 525,600 minutes), the server would only be down for a maximum of 26.28 minutes.

So, with the above security standards in mind, and knowing the consequences of failing to keep your data secure, ask yourself: “How secure are my company’s applications?”

Get started with a safe, secure cloud from today to keep your company’s applications safe, secure, and available for when you need them.