{"id":3010,"date":"2021-12-08T09:10:53","date_gmt":"2021-12-08T15:10:53","guid":{"rendered":"https:\/\/www.dmsi.com\/?p=3010"},"modified":"2022-10-21T12:47:31","modified_gmt":"2022-10-21T17:47:31","slug":"why-the-cloud-is-safer-than-your-network","status":"publish","type":"post","link":"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/","title":{"rendered":"Why the Cloud is Safer Than Your Network"},"content":{"rendered":"<p>Let\u2019s talk about threats.<\/p>\n<p>The weakest points in any security system are the people who use it. That\u2019s why cybercriminals are starting to go low-tech. It\u2019s much easier to trick a human than create a virus. Hackers don\u2019t have to break through your firewall, because employees are letting them in the front door.<\/p>\n<p>There are plenty of proven tools to keep bad guys from breaking into a network. But attacks from the inside pose an entirely different kind of danger. And most businesses are completely unprepared.<\/p>\n<p><strong>How it Works<\/strong><br \/>\nHackers have a host of methods for conning their way into a network. Email is still a very effective method for delivering malware. (You\u2019d be surprised at how many distracted executives will open a file called \u201cQ1 Past Due Accounts.\u201d) Messages may use techniques like baiting or phishing (pronounced \u201cfishing\u201d) to trick people into handing over passwords and account numbers.<\/p>\n<p>Some hackers target employees\u2019 personal computers, which tend to have weaker security. Then they sneak into the company network when the employee logs in remotely or brings a corrupted USB drive into the office. Mobile devices can contract malware through apps and unsecured networks (such as the free WiFi at airports). All of these methods give cybercriminals a way to slip past the company firewall without raising an alarm.<\/p>\n<p><strong>Worse Than You Think<\/strong><br \/>\nHere\u2019s the real problem: Most business networks have weak or nonexistent internal defenses. The emphasis has always been on external measures like firewalls. Good anti-virus software is expensive, and executives didn\u2019t see it as a huge priority (\u201cbecause we have such a good firewall\u201d). Essentially, people put giant locks on their front doors and called it good. Which means if a hacker can sneak past the firewall, there\u2019s likely very little to stop him from stealing your data, crashing your system, and bringing your business to a screeching halt.<\/p>\n<p>This is why the discussion about cyber security needs to change. Businesses have to look beyond keeping the bad guys out and consider what happens once they get in.<\/p>\n<p><strong>The Options<\/strong><br \/>\nDon\u2019t assume your current IT staff can take on this threat. Searching for and responding to internal breaches is more labor-intensive than maintaining a firewall. System administrators don\u2019t have time to run counter-hack operations and support the company\u2019s IT needs.<\/p>\n<p>If a fulltime cyber-security specialist isn\u2019t in your budget, then you need to consider other methods for improving data security. Good strategies include using the best anti-virus software that management will buy, putting more user restrictions in place, prohibiting USB drives, and teaching employees good cyber \u201dhygiene\u201d. Perhaps the most effective strategy for protecting your data is to move it from your private server to the cloud.<\/p>\n<p><strong>The Cloud Bank<\/strong><br \/>\nThe building materials industry has been very slow to adopt cloud-based solutions, in part because many executives don\u2019t trust them. Letting a third party manage their data at a separate location feels risky. Keeping everything in-house, on their own servers, in an environment they control feels safer. But unless your company has a fulltime cyber-security specialist, using a private server is significantly riskier than using the cloud.<\/p>\n<p>A good way to think about it is to compare your data to money. Keeping your data on a private server is like keeping your money in a shoebox. You have direct access, but so does anybody who breaks into the building. It\u2019s easy for them to grab that shoebox and walk out the door. When hackers get past your firewall, they can potentially trash or steal anything on your network. Accounting records, operations data, and customer information are up for grabs.<\/p>\n<p>Using the cloud, on the other hand, is like keeping your money at a bank. The funds are still available, but if a thief breaks into your office, there\u2019s nothing for him to steal. He can\u2019t get to your money because it\u2019s at the bank. And breaking into a bank is an entirely different matter.<\/p>\n<p><strong>Still Not Convinced?<\/strong><br \/>\nSome people are skeptical that the cloud is safer. After all, if a corrupted laptop can infect your entire network, what\u2019s to stop that virus from spreading to your hosted data.<\/p>\n<p>This is a fair question. The simple answer is the cloud is different from traditional networks. It offers multiple layers of security, far beyond what most businesses can afford on their own.<\/p>\n<p>The first line of defense has to do with access. A local network typically has many points of entry, because it\u2019s used by many different software applications. When employees check email, create sales orders, track inventory, or enter payments, they are storing all of those records in the same place. Applications on a local server are sort of like offices on the same hallway. Applications in the cloud are more like guarded buildings on separate roads.<\/p>\n<p>Let\u2019s say a hacker gets past your firewall. If you store all of your data locally, he can walk up and down the \u201challway\u201d, from your email to your accounting records to your customer files, because everything is connected. If you store your accounting data in the cloud, however, he can\u2019t crawl from your email to your billing records because they are in separate locations. In order to get to your accounting data, he has to leave the hallway, exit your building, find the right \u201croad\u201d, and then get past all of the guards. This brings us to the next line of defense.<\/p>\n<p>If data is stored in the cloud, it\u2019s on a server (or multiple servers) at a data center. Data centers make sure your information is accessible to you and only you. These facilities invest heavily in sophisticated security tools and anti-virus software. They also provide 24-7 monitoring by cyber-security experts who constantly walk the (virtual) perimeter, checking for weaknesses and scanning for suspicious activity. (All the things system administrators don\u2019t have time to do.) Let\u2019s go back to the shoebox vs. bank analogy. Your only way of protecting that shoebox is to lock your front door. The bank, on the other hand, has locks on the door, cameras in the ceiling, and German Shepherds patrolling the lobby.<\/p>\n<p><strong>Next Steps<\/strong><br \/>\nUnfortunately, there aren\u2019t any security patches for human behavior. No matter how many rules a company puts in place, somebody will inevitably slip up.<\/p>\n<p>If you want a sobering conversation, ask your IT manager what defenses your network has against an internal attack. Find out which parts of your operation would be affected, and how long your business would be down. Take a hard look at the worst-case scenario, and start planning the best possible response.<\/p>\n<p><em>This article originally appeared in Building Products Digest.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s talk about threats. The weakest points in any security system are the people who use it. That\u2019s why cybercriminals are starting to go low-tech. It\u2019s much easier to trick a human than create a virus. Hackers don\u2019t have to break through your firewall, because employees are letting them in the front door. There are [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[97],"tags":[],"class_list":["post-3010","post","type-post","status-publish","format-standard","hentry","category-article"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why the Cloud is Safer Than Your Network - DMSi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why the Cloud is Safer Than Your Network - DMSi\" \/>\n<meta property=\"og:description\" content=\"Let\u2019s talk about threats. The weakest points in any security system are the people who use it. That\u2019s why cybercriminals are starting to go low-tech. It\u2019s much easier to trick a human than create a virus. Hackers don\u2019t have to break through your firewall, because employees are letting them in the front door. There are [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/\" \/>\n<meta property=\"og:site_name\" content=\"DMSi\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-08T15:10:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-21T17:47:31+00:00\" \/>\n<meta name=\"author\" content=\"jarant\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jarant\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/\",\"url\":\"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/\",\"name\":\"Why the Cloud is Safer Than Your Network - DMSi\",\"isPartOf\":{\"@id\":\"https:\/\/www.dmsi.com\/#website\"},\"datePublished\":\"2021-12-08T15:10:53+00:00\",\"dateModified\":\"2022-10-21T17:47:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.dmsi.com\/#\/schema\/person\/7bc7da501284b130770d91d1854f65d9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dmsi.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why the Cloud is Safer Than Your Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dmsi.com\/#website\",\"url\":\"https:\/\/www.dmsi.com\/\",\"name\":\"DMSi\",\"description\":\"Lumber Yard Inventory &amp; Accounting Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dmsi.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dmsi.com\/#\/schema\/person\/7bc7da501284b130770d91d1854f65d9\",\"name\":\"jarant\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dmsi.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c3f154401c6e5c52b1ea271e6d93f2092f57305853df24423b91e308a3a78e8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c3f154401c6e5c52b1ea271e6d93f2092f57305853df24423b91e308a3a78e8e?s=96&d=mm&r=g\",\"caption\":\"jarant\"},\"url\":\"https:\/\/www.dmsi.com\/resources\/author\/jarant\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why the Cloud is Safer Than Your Network - DMSi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/","og_locale":"en_US","og_type":"article","og_title":"Why the Cloud is Safer Than Your Network - DMSi","og_description":"Let\u2019s talk about threats. The weakest points in any security system are the people who use it. That\u2019s why cybercriminals are starting to go low-tech. It\u2019s much easier to trick a human than create a virus. Hackers don\u2019t have to break through your firewall, because employees are letting them in the front door. There are [&hellip;]","og_url":"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/","og_site_name":"DMSi","article_published_time":"2021-12-08T15:10:53+00:00","article_modified_time":"2022-10-21T17:47:31+00:00","author":"jarant","twitter_card":"summary_large_image","twitter_misc":{"Written by":"jarant","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/","url":"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/","name":"Why the Cloud is Safer Than Your Network - DMSi","isPartOf":{"@id":"https:\/\/www.dmsi.com\/#website"},"datePublished":"2021-12-08T15:10:53+00:00","dateModified":"2022-10-21T17:47:31+00:00","author":{"@id":"https:\/\/www.dmsi.com\/#\/schema\/person\/7bc7da501284b130770d91d1854f65d9"},"breadcrumb":{"@id":"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dmsi.com\/resources\/why-the-cloud-is-safer-than-your-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dmsi.com\/"},{"@type":"ListItem","position":2,"name":"Why the Cloud is Safer Than Your Network"}]},{"@type":"WebSite","@id":"https:\/\/www.dmsi.com\/#website","url":"https:\/\/www.dmsi.com\/","name":"DMSi","description":"Lumber Yard Inventory &amp; Accounting Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dmsi.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dmsi.com\/#\/schema\/person\/7bc7da501284b130770d91d1854f65d9","name":"jarant","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dmsi.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c3f154401c6e5c52b1ea271e6d93f2092f57305853df24423b91e308a3a78e8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c3f154401c6e5c52b1ea271e6d93f2092f57305853df24423b91e308a3a78e8e?s=96&d=mm&r=g","caption":"jarant"},"url":"https:\/\/www.dmsi.com\/resources\/author\/jarant\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/posts\/3010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/comments?post=3010"}],"version-history":[{"count":2,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/posts\/3010\/revisions"}],"predecessor-version":[{"id":3012,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/posts\/3010\/revisions\/3012"}],"wp:attachment":[{"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/media?parent=3010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/categories?post=3010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/tags?post=3010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}