Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 14 October 2009

Cloud computing & customer no-service - match made in heaven?

Posted on 04:20 by Unknown
I never thought I could be so productive. This week I've had less pressure to deliver. I've been able to turn "things" off. All while I'm attending a conference when I usually get even more behind. Well you see, my email isn't working. My email security "application service provider", I mean "managed service", dang it, actually my "cloud computing" provider delivering "software as a service" has apparently decided to take a break from things. I haven't received but 1 or 2 emails in the past two days...I normally get 75+ per day. It's actually been a nice break - especially from all the spam. But it's not what I was looking for.

This outage is actually nothing new with my provider...It's actually an ongoing issue I've had over the years. But the problem usually corrects itself within a few hours. Not this time. So I emailed the company last night using a personal email account and actually got a quick response. Impressive. I thought we were going to be able to have a dialog but apparently their support team decided that leaving for the day was more important. I've followed up with them twice since then...nothing. No response. But I'm going to give them the benefit of the doubt and not mention any names. It's probably something simple. Likely something stupid on my part - I am the "dumb customer" after all.

Side note: I know I can set my MX record to point directly to my email server and get my email back running again...or I could choose another provider. The problem is that I have over a day's worth of emails stuck in my email security provider's queue - likely several days worth since this problem started over a week ago. So I can't give up hope on them just yet...I have to get my emails out.

I'm telling you this story because you have a big, no grand, responsibility to make good IT and information security choices for your business. Buyer beware with cloud computing. Know that just because some cloud computing provider promises the moon that you're actually going to get the service you need. They don't know your business. They don't understand your needs. Cloud computing providers are in business to make money, not coddle you with loving support and bend over backwards to get you up and running. I know, I know, there are lots of good cloud computing providers out there...but how do you know who they are? You usually won't until you find out the hard way...as I am now. Just because your lawyers and their lawyers agreed upon certain terms in a contract doesn't mean some yahoo in tech support is going to care when the time comes.

I'm a one-man shop...imagine if this was a problem someone was having in a large corporation. Someone's rear end would be in a sling right now. His or her job on the line. Speaking of cloud computing gone wrong, was your business affected by the Sidekick debacle? Maybe you're already looking for work because of that...

Don't lose sight of the fact that security and managing information risks is about control and visibility. If you don't have those because of some customer no-service situation then no matter how "cool" cloud computing is at the moment this hype over substance the marketers are pushing is probably not worth the risk.

Enough said, I've got to get back to work and fix this...
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in business continuity, cloud computing, customer no service, stupid security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Reactive security, eh? How’s that workin' for ya?
    Every time I browse the Chronology of Data Breaches and read the headlines coming out from Dark Reading, threatpost, and the like, I can...
  • The compliance crutch mentality rides on
    I believe it was my colleague Kevin Bocek who once said: "Security done right will yield compliance for free. Compliance for complianc...
  • Reaver Pro: a simple tool for cracking WPA on a LOT of wireless networks
    If wireless security testing is on your radar, you need to get Reaver Pro . As I outlined in this Hacking For Dummies, 4th edition chapter ,...
  • Join me live online today with TechTarget & ISACA
    Today is our live virtual seminar Making the Case for the Cloud: The Next Steps . Join me, Urs Fischer, Dave Shackleford, Andrew Baer and Di...
  • My new material on Web application & website security
    Here are several new pieces I've written on Web site/application security. Lots of angles and considerations: There’s more to web securi...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Talk is cheap: Time to rethink your data retention strategy (or lack thereof)?
    Here's a fascinating story about a court case involving data retention you need to read. And pass it along to your management as well. ...
  • Common sense counts the most
    A great quote I heard over the weekend has a direct tie-in to what we focus (or don't focus) our efforts on in information security. NAS...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ►  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ►  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ▼  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ▼  October (21)
      • 1 day left for 50% discount on current audio programs
      • You'd think Twitter would have the means to fix this
      • Disaster recovery is dead?? Not hardly!
      • Metasploit as we knew it going bye bye?
      • Email business continuity - this is funny...and ir...
      • The fastest vendor acquisition I've seen
      • Cloud computing & customer no-service - match made...
      • In case you're trying to email me...
      • Latest version of LANguard worth considering
      • Proper password length
      • Cool tool for cracking/resetting SQL Server passwords
      • My latest security content
      • Asking the right questions
      • Don't give up
      • Good info on hardening Windows XP
      • 10 Ways to Become Indispensable at Work
      • National Archives does it again!
      • My latest security content
      • This is really cool and really scary
      • The deal with my Security On Wheels audio programs
      • Great quote to help motivate you
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile