What is cloud storage? What advantages does it offer?
Cloud storage is a method of storing data that is placed in a place accessible through the network. This place is referred to by the term Cloud.
Once the data is transferred to the remote location, it becomes the responsibility of the Cloud Storage Service Provider. The main role of the provider is to ensure a functioning infrastructure and guarantee the owner access to data safely and at all times.
The need for external storage
Cloud storage is an inexpensive and scalable alternative to storing files on hard drives.
Normally, when users reach the storage limit of their hard drives, they have to transfer the files to an external drive. Although this is a more than acceptable solution for a private individual, when we talk about companies things get complicated.
Once the corporate storage limit is reached, a remote storage solution, or cloud storage, comes in handy.
Cloud storage services provide several business benefits. First of all, the elasticity of the storage limits that can be changed as needed. A further advantage lies in the delegation of maintenance. A company that requires an archiving service will not have to worry about installing and maintaining a local network or expanding it in anticipation of large quantities of documents to be stored.
But what is cloud actually? Let’s see how it works.
How the Cloud works
As mentioned, archiving service providers offer to store their customers’ data. Many are now using this type of technology, although few are still able to answer the simple question “what is the cloud?”. This is because the concept is often abstracted, for convenience, but once sent remotely, somewhere they have to be.
Most services store data on virtual machines hosted by physical servers. This explains in practice what the cloud is: a physical place where remote user data is stored. Each time the demand increases, new virtual machines are added to the existing ones.
When the customer of the service accesses his data, he does so through a browser or an app that connects to the provider’s servers. The server redirects the user to the correct location of the files.
As part of the service, providers typically store copies of data on different machines for redundancy. To avoid, in this way, the loss of data in the unfortunate event that a server is removed or its service interrupted.
Advantages of cloud storage
What is the cloud we saw it a little while ago, it’s time to understand what the real advantages are and what they include:
– Rapid implementation of the service: The service is activated in no time and requires no hardware intervention.
– Remote management: The responsibility for maintenance and security lies on the provider’s shoulders. All activities related to data storage can be ignored by company staff.
– Pay for what you use: The costs of the service are updated based on actual use. The savings are immediate and allow you to treat the cost as operational and not as capital to be invested.
– Scalability: There are no size constraints on the stored data. In a local network, on the other hand, expanding the space has a considerable cost and requires operations on the entire infrastructure.
– Security against data loss: Storing data on external servers eliminates possible economic damage if local data is no longer reachable.
What to pay attention to
There are also a few things to look out for when choosing a provider:
– Security: Security issues are the most common. Providers try to protect their infrastructure with updated technologies and practices, but they do not always succeed. It is essential to trust a provider who cares about the security of their servers, especially when dealing with sensitive data.
– Data administration: Being able to view, access and move data at will is a common concern with cloud resources. Delegating management to third parties offers its advantages, but may also limit control over data.
– Communication latency: Accessing data depends on the network bandwidth available. It can happen, especially when using public networks, that traffic is limited. Within the company, this problem can be avoided by increasing the bandwidth capacity of the connection.
In choosing the cloud storage service for your needs, many factors must be taken into consideration. Between these:
– Rates available
– Space available for each tariff
– Simplicity of implementation
– Ease of management
– Security and privacy
– Continuity of the service
Compared to other providers, ownCloud offers a wide range of very useful features.
Sharing between colleagues and people outside the company is simple and also allows you to set permissions for the individual user.
Security is guaranteed by an end-to-end encryption system and authentication with the OAuth2 protocol, but not only. A system of classification of documents is available which allows control over the distribution of the same.
All processes are tracked and it is possible to trace who accessed and what did the data.
ownCloud is a secure, complete and flexible system for professionals that also allows excellent collaboration between colleagues.
- The threat of DDoS ransomware
- Procedural Security Analysis – Thank you for contacting us!
- Zombie phishing: beware of emails, it could be zombies
- Social engineering: how hackers scam their victims
- What is phishing? Understanding and identifying social engineering attacks
- Avoid Ransomware: That’s why it’s best not to take any risks
- Double extortion ransomware: What they are and how to defend yourself
- Zero-Day attack: what they are and how to defend yourself with SOCaaS
- Backup as a Service (2)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (20)
- Conferenza Cloud (4)
- ICT Monitoring (4)
- Log Management (2)
- News (17)
- ownCloud (4)
- Privacy (6)
- Secure Online Desktop (14)
- Security (6)
- Web Hosting (13)
- Inside Strata's Plans to Solve the Cloud Identity Puzzle February 25, 2021Strata Identity was founded to change businesses' approach to identity management as multicloud environments become the norm.
- Microsoft Releases Free Tool for Hunting SolarWinds Malware February 25, 2021Meanwhile, researchers at SecurityScorecard say the "fileless" malware loader in the attack - Teardrop - actually dates back to 2017.
- North Korea's Lazarus Group Expands to Stealing Defense Secrets February 25, 2021Several gigabytes of sensitive data stolen from one restricted network, with organizations in more than 12 countries impacted, Kaspersky says.
- Ransomware, Phishing Will Remain Primary Risks in 2021 February 25, 2021Attackers have doubled down on ransomware and phishing -- with some tweaks -- while deepfakes and disinformation will become more major threats in the future, according to a trio of threat reports.
- Thousands of VMware Servers Exposed to Critical RCE Bug February 25, 2021Security experts report scanning activity targeting vulnerable vCenter servers after a researcher published proof-of-concept code.
- 5 Key Steps Schools Can Take to Defend Against Cyber Threats February 25, 2021Educational institutions have become prime targets, but there are things they can do to stay safer.
- How to Avoid Falling Victim to a SolarWinds-Style Attack February 25, 2021A multilayered, zero-trust security posture provides a better chance of fending off sophisticated supply chain attackers before it's too late.
- Cybercriminals Target QuickBooks Databases February 24, 2021Stolen financial files then get sold on the Dark Web, researchers say.
- New APT Group Targets Airline Industry & Immigration February 24, 2021LazyScript bears similarities to some Middle Eastern groups but appears to be a distinct operation of its own, Malwarebytes says.
- 61% of Malware Delivered via Cloud Apps: Report February 24, 2021Researchers report the majority of malware is now delivered via cloud applications - a jump from 48% last year.
- Backdoor.Win32.DarkKomet.irv / Insecure Permissions February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/a229acff4e0605ad24eaf3d9c44fdb1b.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.DarkKomet.irv Vulnerability: Insecure Permissions Description: DarkKomet.irv creates an insecure dir named "Windupdt" under c:\ drive, granting change (C) permissions to authenticated user group. Standard users can rename...
- Trojan.Win32.Pluder.o / Insecure Permissions February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ee22eea131c0e00162e4ba370f396a00.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Pluder.o Vulnerability: Insecure Permissions Description: Creates an insecure dir named "z_Drivers" under c:\ drive, granting change (C) permissions to authenticated user group. Pluder.o also creates several registry key...
- Trojan.Win32.Pincav.cmfl / Insecure Permissions February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/9d296ebd6b4f79457fcc61e38dcce61e.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Pincav.cmfl Vulnerability: Insecure Permissions Description: The trojan creates an insecure dir named "Windupdt" under c:\ drive, granting change (C) permissions to authenticated users group. Standard users can rename the...
- Trojan-Proxy.Win32.Daemonize.i / Remote Denial of Service February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/61bec9f22a5955e076e0d5ddf6232f3f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Proxy.Win32.Daemonize.i Vulnerability: Remote Denial of Service Description: Daemonize.i listens on TCP port 5823, sending some junk packets to the trojan results in invalid pointer read leading to an access violation and […]
- Backdoor.Win32.Ketch.h / Remote Stack Buffer Overflow (SEH) February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/63c55ad21e0771c7f9ca71ec3bfcea0f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Ketch.h Vulnerability: Remote Stack Buffer Overflow (SEH) Description: Ketch makes HTTP request to port 80 for a file named script.dat, after process the server response of 1,612 bytes or more it […]
- Backdoor.Win32.Inject.tyq / Insecure Permissions February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/833868d3092bea833839a6b8ec196046.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Inject.tyq Vulnerability: Insecure Permissions Description: The backdoor creates an dir named "hotfix" under c:\ drive granting change (C) permissions to the authenticated user group. Type: PE32 MD5:...
- IBM(R) Db2(R) Windows client DLL Hijacking Vulnerability(0day) February 23, 2021Posted by houjingyi on Feb 23A few months ago I disclosed Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability I found : https://seclists.org/fulldisclosure/2020/Oct/16 In that post I mentioned "I will add more details 90 days after my report or a security bulletin available". Here it comes. NOTICE : This vulnerability seems did not get […]
- CIRA Canadian Shield iOS Application - MITM SSL Certificate Vulnerability (CVE-2021-27189) February 23, 2021Posted by David Coomber on Feb 23CIRA Canadian Shield iOS Application - MITM SSL Certificate Vulnerability (CVE-2021-27189)
- [KIS-2021-02] docsify <= 4.11.6 DOM-based Cross-Site Scripting Vulnerability February 20, 2021Posted by research on Feb 19-------------------------------------------------------------- docsify
- Backdoor.Win32.Bionet.10 / Anonymous Logon February 19, 2021Posted by malvuln on Feb 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/be559307f5cd055f123a637b1135c8d3.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Bionet.10 Vulnerability: Anonymous Logon Description: The backdoor listens on TCP port 12348 and allows anonymous logon credentials to be used to access an infected host. Type: PE32 MD5: be559307f5cd055f123a637b1135c8d3 Vuln ID:...
Cyber threat intelligence identify dangers before they cause damage Find threats before they become a problem… https://t.co/eoT3Mfmi7g
Analisi di Sicurezza Procedurale Verifica che le operazioni in azienda rispettino gli standard imposti per il trat… https://t.co/HYs4UsX3mP
VPN Aziendali connessioni protette sempre e dovunque Gran parte del lavoro ormai passa per la rete,la sicurezza dev… https://t.co/ZreMXSsS17
Ultimamente ci sono stati casi critici di ransomware degni di nota. L’Universita' Tor Vergata ha subito un attacco… https://t.co/oHVilx0VXx
There have been critical cases of ransomware of note lately. Tor Vergata University suffered an attack that knocked… https://t.co/FQYuyKdAv6