Matt Brunk
Matt Brunk has worked in past roles as director of IT for a multisite health care firm; president of Telecomworx,...
Read Full Bio >>

Matt Brunk | September 11, 2015 |


Are You Sitting on a Cloud-Based House of Cards?

Are You Sitting on a Cloud-Based House of Cards? Don't bring down your company because you've failed to do your due diligence before signing up for cloud services.

Don't bring down your company because you've failed to do your due diligence before signing up for cloud services.

When a COO makes demands to secure his organization, you have to wonder what the business has done to place itself at risk, and why. Could such a mandate stem from a HIPAA violation or be the result of a compromised customer list? Or is the use of cloud services somehow at fault?

As we know from discussions about cloud communications on No Jitter, many companies are using public cloud services because they provide quick and easy access on the cheap if not for free. But this ease of access sometimes means little thinking and planning goes toward the cloud decision, leaving business owners and leaders to say, "We didn't know," should a data breach or other issues surface.


Before jumping on the cloud, enterprises need to do some research and ask some key questions regarding privacy, security, availability, contingency, and data ownership. In some cases, a thorough reading of a terms and conditions agreement will reveal important information on data ownership -- as in, your organization cedes control of data ownership to the cloud provider.

In other cases, you might find your organization unable to get service restored quickly should you not have vetted the cloud provider properly. You need to know in advance, for example, what might happen to your data that lives on a shared cloud resource hosting another company's data that's been breached. Are companies on shared cloud resources adequately prepared in the event of a data compromise? Are your cloud service providers adequately prepared and equipped to mitigate attacks or breaches?

Today's landscape is a similar scene from the early days of divestiture, but with a huge cautionary note. Not only are technology and configurations more complex, but also are more diverse and interconnected. One compromise has the potential to knock down a house of cards, and while it may not be as probable, it's always possible that when there's a hole someone is bound to find and exploit it.

Whether you are utilizing public, private, or hybrid cloud services, due diligence requires your attention. In April, the Cloud Security Alliance (CSA) announced that the software-defined perimeter withstood the challenges against it in the group's third-annual hackathon. Still, businesses need to understand that not all cloud services are equal, and they need to get on board with how to handle any compromise or data breach that occurs in the cloud. Even some of the largest organizations have had their lessons learned on improper preparation.

Follow Matt Brunk on Twitter and Google+!
Matt Brunk on Google+


April 5, 2017

Its no secret that the cloud offers significant benefits to enterprises - including cost reduction, scalability, higher efficiency, and more flexibility. If your phone system and contact center are

March 22, 2017

As today's competitive business environments push workforces into overdrive, many enterprises are seeking ways of streamlining workflows while optimizing productivity, business agility, and speed.

March 8, 2017

Enterprise IT's ability to innovate is critical to the success of the business -- 80% of CIOs agree. But the CIO role has never been more challenging than it is today, with rising operational respo

March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.