Welcome to #WeekendWisdom number 69. This week we’re going to talk about cloud dependency.
So what is cloud dependency all about?
People think I’m overly cautious when I suggest to them that they should put in place contingency planning for events that are really highly unlikely to occur. But the thing is, they do occur and they will always occur at the worst possible time.
This is particularly true in relation to things like the cloud. People are sold the cloud on it being a highly resilient, always available solution, that you will never be without access to.
Can you give an example where this dependency caused an issue?
But think about the thousands of customers of Megaupload, a file sharing service that was visited by the FBI back in 2012 when they seized all of their infrastructure because it also hosted lots of copyright material. All of those legitimate businesses lost access to their data.
That was ages ago. The cloud is much better now.
Earlier this week, in a data centre in Strasbourg, there was a fire which destroyed one building, damaged a second and the other two buildings associated with that Data centre had to be shut down. So the fire suppression systems that were in place there may have failed or they were overwhelmed or something. But needless to say, all that infrastructure is now unavailable and possibly will be for a couple of weeks.
So what should you do?
It’s not inaccurate to suggest to people that you should plan for crazy contingencies like this because if you are depending on that app or that infrastructure in the cloud, you really need it to be available when you need it. So put in place some kind of contingencies.
So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.
How can L2 Cyber Security help you?
We offer a full range of training programmes, which can be delivered online or in-person*.
L2 Cyber Security are also a partner of CyberRiskAware for online self-directed Cyber Security Awareness training and Phishing testing.
Contact us for more information at info@L2CyberSecurity.com.
*With appropriate social distancing and other health and safety measures adhered to.