
Why cloud solutions are the most secure
Would you sew your fortune into your mattress? No, would you? But no sooner are we done discussing this issue with our skeptical grandparents than a modern dilemma arises. An almost identical problem, in fact.
The modern 'mattress' is called 'legacy'. Modern businesses often rely on an inherited foundation of legacy systems, on-premise systems where servers and software are connected within their own network.

Although new data security regulations are pushing more and more companies into the cloud, it's unthinkable for most legacy users to switch to a total cloud-based solution in one fell swoop. But many do it gradually - fastest with the systems that require the most security.
When all data is gathered in one place, the cloud, it's much easier to get an overview and, not least, to delete everything with just a few clicks. This kind of data deletion is almost impossible in traditional on-premise conditions, where data is spread across many platforms, on both physical archives and local machines.
The four security measures of cloud technology
Then, of course, there are those who prefer to 'sew in the mattresses'. Those who believe that in the fight against cybercriminals and hackers, it's best to take care of security yourself. To them we can refer to the following four arguments collected by Sarah Patrick, analyst at US research firm Clutch:
- Cloud providers have heavy security and massive surveillanceManylegacy systems come from a time when cybercrime was less common and security served more to prevent errors than actual hacker attacks. As a result, systems are highly vulnerable now. Yet many companies simply hide their data equipment and important files behind a locked door, while cloud providers' data centers actually operate with multiple layers of security defenses, high barbed wire fences, concrete barriers, patrolling guards and security cameras.
- Controlled accessDatain physical form is easier to stumble upon and be tempted negatively. When data is stored electronically and separated from the company's physical space, it is virtually eliminated for the devious intentions of a third party.
- Experts in cybersecurityCloud providershave the most competent security experts constantly monitoring systems.
- Thorough and frequent auditingCloud providersprotect themselves against security leaks with annual audits. However, to make sure your on-premise systems are up-to-date, you need to check the thousands of platforms you have in play behind your system. It's almost impossible that there won't be a security breach at some point!
Human error
Of course, these four arguments do not mean that things can't go wrong. It can. But perhaps it's worth recalling the image of grandma's mattress opposite a high-security data center. Where would I prefer to store my valuables?
Sarah Patrick cites three examples of cloud hacking: Target, Home Depot and Apple's iCloud. In two of the cases, the hackers gained access through a third-party leak. In the story from 2014, where a number of celebrities' nude photos were hacked from Apple's iCloud, the hackers had not had access to the iCloud either, but had simply guessed the people's 'weak' passwords.
Neither grandma nor iCloud can fully guard against human error.