If you follow our blog, you’ve probably noticed that we’ve been focusing lately on data security, cyber threats, cloud computing, and overall business continuity planning:
- IoT and BYOD Scream for a Written Network Security Policy – Here’s Where to Start
- Six Disaster Recovery Questions to Ask to Ensure Your Business Continuity Plan is Ready to Go
- The Evolving Cyber Threat: Cloud and Data Security Resources to Consider
According to a recent Reuters’ article, this focus is likely warranted: With Nasdaq at Records, Investors Ask What’s Next for Tech highlights the recent surge the index has enjoyed as it sits close to records for the first time in 15 years. The article theorizes that the stocks that have led this surge are likely not going to take it to the next level, namely Apple, Facebook, and other recent hot stocks. Rather, sectors like cyber security, cloud services, and electronic payments will lead the way over the next three years.
The article describes Skip Aylesworth, a portfolio manager of the Hennessy Technology Fund:
He has been reducing his position in biotech companies such as Gilead Sciences and moving more money to cyber security companies, which now take up approximately 10 percent of his portfolio. As more companies move key parts of their businesses to the cloud, the importance of protecting data will only grow.
Many of the large IT consulting firms (Forrester, to name one) are also predicting that cloud computing adoption will accelerate and become the new standard, especially with the impending growth of IoT and its many possibilities.
In 2015, cloud adoption will accelerate and technology management groups must adapt to this reality by learning how to add value to their company’s use of these services through facilitation, adaptation and evangelism. The days of fighting the cloud are over.
From an organizational perspective, cloud computing and cyber security go hand-in-hand. While cloud computing certainly offers organizations a distinct competitive advantage, depending on the deployment model you adopt, data security can be an issue. If you restrict cloud computing access points for the sake of network security then competitors potentially gain the advantage. But if you open up public cloud access at the sake of network security, the company could potentially suffer. This is a fine line that IT and network security personnel must navigate carefully, and often it comes down to selecting the right cloud deployment model to fit your organizational needs.
I’m sure as 2015 continues to unfold you’ll see more cyber security and cloud computing posts from us (and certainly others as well). Both of these areas are inextricably linked together and each determines how the other evolves within the organization.