Malicious insiders could hurt cloud computing

The future will see many businesses asking questions about how their data is secured in the cloud.

A Symantec security expert has warned companies offering services in the cloud that malicious insiders could render security controls useless.

Guy Bunker, chief scientist at Symantec, said that cloud service administrators had "god-like status" when it came to accessing confidential data.

He said that there were already low-key legal cases being taken against cloud service providers, where administrators had access to data.

Bunker said: "This isn't just cases in the cloud we've seen this in enterprises where somebody within the organisation who has access to the data has decided to take it and sell it on to somebody else."

Bunker was speaking at a Symantec-held event about how businesses should cope with cloud computing in terms of security.

The Symantec expert also said that enterprises often didn't know what their sensitive information was or even where it was, and that the cloud compounded the issue.

He said: "The reality moving forward in two to three years is that there will be a much shorter relationship [between businesses and cloud computing vendors]."

He added: "What happens to the data that you put out there and process? Apparently there's no assured delete has the data actually been deleted from the cloud?"

Other speakers suggested that there was no possible international regulatory solution when it came to securing cloud computing, and that the best hope was for businesses to organise a technical standards body.

John Carr, secretary of the UK's Children Charity Coalition for Internet Safety, suggested that there should be a kitemark' - a technical standard for cloud computing.

He said: "Only the businesses can do that. I seriously doubt there is any governmental institution that can get even close."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

13 Apr 2021
5G will accelerate cyber crime, predicts former White House CIO
5G

5G will accelerate cyber crime, predicts former White House CIO

13 Apr 2021
How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021