Debunking 5 Myths Surrounding the Cloud and Healthcare

Debunking 5 Myths Surrounding the Cloud and Healthcare

Businesses across every industry are experiencing significant benefits from migrating to the cloud – including cost savings, scalability, and reduced pressure on IT teams. The healthcare industry in particular has seen great leaps using cloud computing – indeed, the global healthcare cloud computing market is expected to exceed more than $11 billion by 2022 according to Market Research Engine. But the cloud and healthcare has also seen its fair share of bumps in the road as far as adoption goes. Compliance and regulatory issues surrounding patient data require caution, but healthcare organizations may be taking a bigger risk by not implementing cloud out of such caution.

Take a look at five common myths related to the cloud and healthcare:

Myth #1: The cloud is not secure enough for healthcare organizations. Not only is the cloud secure, but it’s often more secure than on-premise solutions. (And if an organization is looking at desktop as a service specifically, that solution far surpasses on-premise in terms of security.) A cloud provider staffs its data center with armed guards and equips it with tools like security cameras, perimeter controls, multiple power grids, and biometric authentication. It’s not likely that healthcare organizations can practice the same level of security and breach prevention that a cloud provider offers.

Myth #2: Cloud infrastructures are all the same. Sure, the cloud infrastructure consists of network, storage, and compute, but there’s a lot of variation within this framework. Your infrastructure should be designed for your specific needs. It should be highly redundant and secure, and it should support the burstability that is necessary in healthcare during a surge of use. It also needs a high level of monitoring and logging to identify any anomalies in user activity.

Myth #3: Data stored in the cloud is more vulnerable to an attack. Quite the opposite: Data in the cloud may be more secure than data in on-premise servers because it has been encrypted and secured. It’s critical to talk with your cloud provider about the depth of its security policy and whether it meshes well with that of your healthcare organization.

Myth #4: Data stored in a public cloud is accessible to other healthcare providers using the same cloud. If your data is encrypted, other healthcare providers should not be able to access it, but it’s important to talk through this issue with the cloud provider. The shared model of public cloud makes it easy to access innovations and features, but it does require you to do a bit more digging to be sure that your data is encrypted and secured. Private clouds do not allow for this issue.

This also goes back to the point that cloud providers spend more time and resources on security than any healthcare organization could, so healthcare operations in the cloud are better guaranteed to ensure compliance. 

Myth #5: Once data is in the cloud, healthcare providers lose visibility and control. The best way to address this area is to make sure that you extend the same controls you already use into the cloud. This means that your authentication protocols, user management and access management are extended into your cloud solutions. Make sure that you choose a cloud provider that ensures you have an auditable chain of custody for data.

If you still have questions about how cloud solutions could help your healthcare organization achieve business objectives, or if there are a few more myths we need to debunk, contact us at Effortless. You can also take a look at this free download for more information about the cloud and healthcare.

How to Sell Security to a CISO

How to Sell Security to a CISO

We had the pleasure of sitting in on a speaker session by Levi’s CISO, Steve Zalewski, who gave a unique and inside view of the real life of someone in his role. If you’re interested in learning more about this role and want to be better equipped to sell to a CISO, keep reading to find out the good, the bad, and the ugly.

Selling Security to the CISO

When it comes to selling technology solutions to a Chief Information Security Officer (CISO), many salespeople may not realize what they’re doing wrong in the pitching process. For Zalewski, the wrong pitch is bent on politeness and doesn’t cut to the chase. He said, “Please don’t be polite with me. Perhaps you come from telecom and are used to working with IT organizations – but you are likely not used to reaching into the security department at an organization trying to sell security. You’re pushing a rock up the hill if you lead with politeness. We need to get past the polite part. Be upfront: What is it that you want to ask?”.

How you approach a CISO will impact his/her decision to either stick with you or move on. Therefore, it’s crucial to understand what a CISO is looking for and what he/she needs in order to make a successful sale. For Zalewski, that’s a direct, upfront approach because he doesn’t have time for more than one potential vendor call a week.

CISOs are protectors of the environment who are often stressed and overwhelmed by the number of technology options and solutions they’re considering or looking to implement. Therefore, for vendors who want to sell security to a CISO, there are a few crucial things that they must know:

Don’t throw tools at them: CISOs already have a lot on their plate. They don’t need vendors to throw tools at every problem they have. Instead, you have to find the metrics of the business in order to really figure out what the CISO needs and how to reach him/her.

Step up your game: If you’re selling security, you must understand it and be an expert. You must know your subject matter such as who you’re going to attack, and position yourself against the bad guys.

Make your business propositions resonate: As a vendor, it’s more than making your technical proposition resonate. You must be able to communicate why and how security services can help CISOs mitigate risks and translate business value.

When approaching CISOs, advisors must know the difference between security and protection: In order to deliver what the CISO needs, vendors must know the difference between these two elements of a solution. As protectors of their brand, CISOs are already forced to look at potential threats to their company. “For me, it’s a junior person who is simply talking in terms of ‘security’. Really it is ‘are we protected? Are we safe?’ That is what needs to be addressed” said Zalewski. And as a result, the head of information security needs trusted advisors who will understand those risks and offer the right solutions to keep them protected.

Address visibility: “Often the greatest threat is between the keyboard and the screen,” said Ivan Paynter, National Cyber Security Specialist at Intelisys. To this, Zalewski agreed and added that the bad guys are constantly doing “social engineering and will find a way past you. You will click. You are human.” Addressing the need for visibility into the network, and into what the users are doing, is speaking the language of the CISO.

Talk in terms of risk: As Zalewski said, “My job is to protect the brand. We are the Coca-Cola of jeans. Instead of talking technology, you might want to talk in terms of the risk for various scenarios so that if these events occur, you are able to get through it. When you get to the CEO, the board, and executive level, you have to talk about risk – business risk.”

In summary, when presenting security solutions to the C-level, and specifically the chief of information security, you must be able to communicate in a way that convinces them of your security knowledge and expertise. CISOs would much rather have vendors and salespeople shift from an IT perspective to a business perspective when selling them security services.

If you found this recap useful and would like to learn more about how you can address the needs of the CISO, reach out to us at Effortless today.

How DaaS Addresses the Dark Side of Working from Home

How DaaS Addresses the Dark Side of Working from Home

It’s probably not surprising that remote workers outperform office workers in several key areas. Studies have shown that people working remotely are more productive, better at collaborating, and more present than their office-bound counterparts. In fact, 65% of workers say working remotely would boost their productivity. This is doubly true with the amount of time some workers spend just getting to and from the office. According to a report by Apartment List, the number of people who travel more than 90 minutes to work each way has increased by more than 31% since 2005. In contrast, the number of Americans who work from home has increased by 76% in the same period of time.

TJ Galati, CIO and thought leader who virtualized his entire company and workforce with the Effortless Suite, told Effortless, “There are many benefits to utilizing a remote workforce that companies are just starting to figure out. A few of my favorites are:

  • Less cost. (Rent, desks, ergo keyboards, coffee, etc.)

  • Better quality of life for employees. (No commute, time with family, flex time, etc.)

  • Bigger employee pool. (Instead of finding the best local person, now you find just the best person.)”

Enabling remote work is “truly transformative for companies who have not yet ventured to think that way,” said Galati. There is, however, a dark side to working from home. You’ve probably seen the YouTube video where a serious BBC video interview is interrupted by a silly child walking into the room followed by a baby in a walker. But children interrupting video conferences is on the lighter side of some of the issues that can come up for remote workers. Problems related to security, internet connectivity, and general communications often arise. This is where Desktop as a Service (DaaS) is an ideal solution when it comes to supporting remote workers. Here are some of the pain points of remote workers, and how DaaS relieves them:

Security Woes

There are a number of ways that remote workers have the potential to create security vulnerabilities:

  • Unsecured devices left open in the home or in public spaces

  • Lack of endpoint security

  • Sensitive data physically leaving the company premises

With DaaS, the desktop and its assets are kept in the cloud, away from any vulnerable endpoints. Devices used by remote workers merely become access points for the desktop, rather than the desktop itself.

Internet Issues

Even the most well-equipped remote worker can run into problems with internet connectivity, whether it be a slow connection or one that is unreliable. Remote workers without access to cloud-based solutions like DaaS are left without IT support when they need it most. A good DaaS provider offers round-the-clock support, so if things go wrong, your remote workers aren’t left without a connection.

Communication

This may seem like a given, but it’s important that remote workers have proper communication channels set up in order to do their jobs. DaaS allows workers to retain the full functionality of their work computers no matter where they go, and on any device. Remote employees can access all the communication, conferencing, and collaboration tools they need, as long as they have an internet connection.

If your remote staff is experiencing the darker side of working from home, or worse, unable to do so because you lack the technical means, Effortless can help. With Effortless Desktop, your staff can be powered by a remote desktop that is secure, lightning-fast, and accessible from any device with an internet connection. If you’re ready to build the perfect desktop and access it on any device, contact Effortless. We’ll help you solve any issues being faced by your remote employees.

Effortless Achieves Corporate Sustainability by Operating in Switch Data Centers

Effortless Achieves Corporate Sustainability by Operating in Switch Data Centers

Switch’s 100 Percent Renewably Powered Facilities Help Reduce the Effortless Carbon Footprint

Effortless, a business cloud services provider that delivers maximum security and uptime to its clients, today announced it has achieved a green milestone by operating within Switch. Switch (NYSE: SWCH), is the global technology infrastructure corporation that develops hyperscale data center ecosystems for elite colocation, enterprise hybrid cloud and connectivity solutions. Effortless benefits directly by operating in Switch’s data centers because Switch utilizes 100 percent renewable energy to power its operations, allowing Effortless to achieve its corporate sustainability objectives.

Switch’s advanced power and cooling technologies, remarkable PUE ratings, and high-density rack configurations allow Effortless to fit its IT equipment into a smaller footprint, thus dramatically reducing energy consumption. Running its data in Switch data centers, enables Effortless to reduce its carbon footprint and overall environmental impact.

Switch’s accomplishment of becoming the first multi-tenant colocation operator in the world to receive all A grades in sustainability from Greenpeace 2017 Clicking Clean Report also attracted Effortless to Switch.

“Effortless shares Switch’s commitment to clean energy as part of our culture of sustainability, said Effortless CEO Ben Gayheart. “The opportunity to run our gear inside the most sustainable technology ecosystem results in significant power efficiencies for our operations and extended lifespan on our equipment. We are proud to join the hundreds of world-leading corporations, government agencies, and innovative companies that comprise the Switch ecosystem.”

About Effortless Office

Effortless is a business cloud services provider that offers an all-in-one, highly compliant cloud environment including solutions for cyber security, virtual desktops, disaster recovery, servers, compliance, Wi-Fi, infrastructure, email, and helpdesk. As more than just a vendor, Effortless partners with clients to improve operations, efficiency, and mobility with its “as-a-service” model. Effortless delivers and fully supports a secure ecosystem of complementary cloud products and services giving customers a single solution provider for entire IT environments.

To learn more about Effortless’ efforts toward sustainability as a business cloud services provider, contact Effortless today.