Prisoner in Your Own Cloud
The cloud simplifies remotes access, business continuity, and disaster recovery. But what happens when you change IT service vendors?
From basic services like email and Office365 to Infrastructure as a Service and complete virtual desktop, an organization can gain flexibility, redundancy, business continuity, security, and even competitive advantage by working in a Cloud environment.
With high-availability access, on-demand computing power, limitless storage, enterprise grade security and more, the rate of Cloud adoption among small/mid-size businesses was increasing before the pandemic and has hit ludicrous speed once the remote workforce took to their homes. <<< https://www.helpnetsecurity.com/2020/12/16/accelerated-cloud-migration-business-data-insecure >>>
Since most organizations will use a technology integrator or managed service provider for the migration, what happens when that vendor is no longer providing services?
Even without a “long-term contract”, because of how some Cloud environments are designed, a business can get stuck in a scenario that makes it hard to change IT vendors.
So, how can your business stay protected? Here’s what you need to know:
• When MSPs first began considering Cloud for their clients (almost a decade ago) public Cloud wasn’t what it is today, and most built their own.
• Leveraging private data centers, these technology firms invested in massive infrastructure, and built highly proprietary “walled gardens”
• Offering clients a scalable environment with business continuity and integrated disaster recovery, a solution was born
• Over the years, IT firms spent hundreds of thousands of dollars in capital expenses and upgrades to ensure performance, availability, and security. Changing their Cloud offering isn’t typically an option
• Clients in these environments have only one choice when it comes to who can provide services/support. Migrating to a new platform is costly and time intensive.
Technology firms that made the leap to offer public infrastructure do see thinner margins, but they also have access to the most cutting-edge technology, integrated cybersecurity tools, and tremendous flexibility for clients that understand data custody and have concerns about uprooting an entire virtual ecosystem if the need for a new technology partner arises.
So What Can You Do?
Understanding who has custody of your data (where data resides), how it’s accessed, and what’s involved when it comes time to sever a relationship is critical, and it’s up to you, the client, to figure it out. Here are a few questions you want to ask:
- Where is your data stored? (Private data center, public cloud, other)
- What virtualization tools/systems are used for access?
- Is there anything proprietary about the infrastructure or how it’s accessed?
- What happens when the IT company is no longer providing service?
- Is it a total “lift and shift” of your data, email and apps?
- Is it simply changing the owner of record?
- Ask: "What’s involved in a typical migration?"
- If possible, speak with references and even former clients to discuss their migration experience.
At the end of the day, no one of us want to think about ending a relationship before things even get started. But since change is one of the few constants, being prepared is critical and it’s always better to address these issues now when the relationship is healthy.
We’d love to hear your thoughts on Cloud adoption, or a story relating to Cloud on-boarding/off-boarding. Email us at PartnerWithUs@Overwatchgrp.com
More from the author
A Business Case for Zero Trust Cybersecurity
The medical community has always been at the front of the line when it came to technology integration. Now, as attacks on the healthcare industry explode, executive leadership, board members, doctors and practice administrators wonder what they can do differently. The answer - trust no one, ever! Here's how...
Next Gen Cloud for Midsize Accounting
Accounting firms are relatively conservative when considering a move to the Cloud. But with a hybrid workforce now a necessity, here’s how we helped one firm make the jump.
It’s Cyber Awareness Month… So!?
We believe cybersecurity (and business technology overall) are factors of an organization’s culture. As such, we recognize the importance of building awareness through communications, events and month-long campaigns that serve to remind, educate, and inspire us to take action.
What is Zero Trust Cybersecurity?
Instead of trusting particular devices or connections from certain places, zero trust demands that people prove they are who they claim.
Overwatch Group has evolved into a visionary technology consultingpractice that serves as a trusted partner to hundreds of leading organizations. We felt that it was finally time for our identity to reflect our mission,values, and vision for the future.
Amazon Sidewalk: Why and how to disable it
As the development of connected devices accelerates, big tech is facing a small problem. What happens when these devices lose their Wi-Fi connection and stop working properly? Things like pet locators, Ring Doorbells, security cameras, floodlights, your Alexa/smart speaker, and more. Their solution – Amazon Sidewalk. Here's why and how to disable the function immediately.