Seeing Both Sides of the Cloud
February 5, 2014 | Authored by William Prohn CISSP, CISA, CGEIT, CRISC, CMMC-AB RP
“I’ve looked at clouds from both sides now
From up and down, and still somehow
It’s cloud illusions I recall
I really don’t know clouds at all”
– Judy Collins, “Both Sides Now”
As Judy Collins famously noted, there are two sides to cloud computing and it’s important that you consider both of them. While it is easy to identify the benefits of outsourcing your IT needs, the risks associated with cloud computing may be more difficult to see. It’s important to ask the right questions before diluting your control over your data.
Who owns my data once it is in the cloud? Will outsourcing impact my organization’s compliance? How do I know my data will stay confidential? Get the answers to these questions and more in our latest whitepaper: “Lifting the Fog to See the Cloud.” Click the image to download!
Lifting the Fog to See the Cloud provides an introduction to cloud computing and addresses the benefits and risks associated with operating in a hosted environment.
Topics include:
- Data ownership
- Backup
- Business continuity
- Cyber security insurance
- Compliance
Need help?
If you are unsure that your business is adequately protected, our Information Security Baseline Review is an ideal starting point for answering all of your questions, and providing you and your key managers with a basic education of both the threats your company’s information faces and what practical approaches you can take to protect it.
Remember, a false sense of security is worse than being unsure. We have a variety of tools and resources to help you. I encourage you to call to take proactive action.
For more information, please contact William Prohn at wprohn@dopkins.com.

About the Author
William Prohn CISSP, CISA, CGEIT, CRISC, CMMC-AB RP
Bill oversees all aspects of information technology for the firm, and provides consulting services to a wide spectrum of Dopkins’ clients. He has over 30 years of experience in accounting and business information systems. His specific interests include creating meaningful, practical management information using computer technologies, and the security of business information and systems.