- Content Marketing
When Your Customers Become Your Contributors: Brand Journalism Meets TraditionalGoogle Is Changing the Close Variant Matching Option in AdWordsBefore You Invest in Online Advertising, Do This!Native Advertising: The New New Thing or a Race to the Bottom? [VIDEO]
Technology & Data
Data and Creativity at the Social Shake Up: Defining Your Data-Driven Social CampaignTalking Strategy and Data with Shannon Lee of Precision StrategiesNew IBM Study Reveals 3 Key Characteristics of the Most Successful CompaniesMinority Report: Confronting Privacy Issues in Big Data Gathering
- Tech & Innovation
- marketing automation
Social Startups: Moment.me Captures a 360-Degree View of The Social Shake-Up 2014Hootsuite Partners With Syracuse University to Bring Social Media Savvy to College StudentsThe Best Hyperlapse VideosThe Best Content Moderation Tools for Busy People Who Don't Have Time for That
Social Change Agent Survey: Passion, Skill Set, and Persistence Lead to Career GrowthThe Social Shake-Up Attracts Wide Breadth of Brands and IndustriesThe Social Shake-Up: How CMOs Drive Innovation and Revenue GrowthThe Social Shake-Up: The Future of Social Business
- Small Business
- Social Organization
Recap from the First-Ever Employee Advocacy SummitFormer IBM Senior Advisors Launch Brands Rising to Build Employee Advocacy ProgramsPerformance and Risk Management Through Social Media TrainingEmployee Advocacy Summit: Advocate Stories from the Field
- Customer Service
Join us September 15th in Atlanta for The Employee Advocacy Summit and learn how to unleash the power of your employees.
Post your event here and we'll share it with our community. If one of our members is featured, we'll promote as well on their profile.
- Marketplace & Webinars
The SMT Marketplace
Your resource for exclusive content and insights from Social Media Today, and opportunities to reach our community of professionals.
The Social Business Book Club brings you books, discussions, and insights from today's to business thought leaders.
Join interactive talks and and panel discussions with leading thinkers and practitioners on social media and networked business, or browse the catalogue of recorded sessions - all completely free.
Reach Social Media Today's community of marketing and communications professionals in an editor-approved context with a native advertising package.
Government Agencies Acknowledge Security and the Cloud
Posted on July 3rd 2014
CMS And Healthcare.gov
Until earlier this month, the Centers for Medicare and Medicaid Services (CMS) only allowed internally managed hardware to be used to process data used in its new risk adjustment process, required under the Affordable Care Act. However, CMS is now giving its stamp of approval to use Amazon Elastic Compute Cloud (Amazon EC2). The CMS Risk Adjustment process involves processing and storing health care data so that funds can be transferred from high-risk groups of patients to low-risk ones. The objective is to distribute funds more evenly, protecting insurer’s financial interests. The second place being introduced to cloud technology is Healthcare.gov. According to the Wall Street Journal, the government health site chose Amazon Web Services (AWS) to improve functionality and better handle some of the consumer services before open enrollment begins again in November. The site's home page, coverage application and comparison tool are among the pages that will utilize Amazon cloud technology.
Security And The Cloud – Questions
One of the main concerns of using any software, application, or service for both users and enterprises alike are securityand data transfer – especially in a cloud environment. Most companies have the general feeling that their data is already safe in-house, even if in reality it is not all that secure. But what happens if the data is moved to the cloud? Common questions include:
- Is the data safe?
- Who has control of the data?
- Is it reliable?
- Is the environment secure?
- What safeguards are in place to protect the data?
- What happens if there is a security breach or loss of data?
Education and knowledge transfer of cloud computing are ways to answer these common questions, especially for companies that tend to be categorized as safety-conscious. For these types of organizations, multiple layers of security are necessary in order to make the shift to cloud environments. First, there is a need for user management to say who can use a particular service or application. Second, there needs to be a system to control the users allowed in the cloud environment. And third, there needs to be a way to manage the level of authorization a user has in the cloud and what type of access they have to view or modify files in the environment.
This is where AWS and Amazon EC2 come into play. Amazon continues to reinforce that security is critical and paramount for the company along with the importance of leveraging top-notch security for a seamless user experience. According to an AWS webcast last October, “in order to provide end-to-end security and end-to-end privacy, AWS builds services in accordance with security best practices, provides the appropriate security features in those services, and documents how to use those features.” AWS defines Amazon EC2 as “a web service that provides resizable compute capacity in the cloud. It is designed to make web-scale computing easier for developers.” Benefits of using this web service include elastic web-scale computing, complete control, flexible cloud hosting services, integration with AWS, reliability, security, cost, and easy to start. For more information on security, refer to the Amazon Web Services whitepaper, AWS Security Best Practices.
An Endorsement Of Cloud Security
The government's endorsement of AWS should give confidence to organizations considering AWS or other cloud technologies. "If AWS is good enough for the government, it's probably good enough for you," said Dave Bartoletti, an analyst with Forrester Research. This isn't the first time a government agency has turned to AWS. Last year, Amazon won the bid to build a cloud system for the Central Intelligence Agency. It's a key indicator of the government's changing attitude toward the cloud and a testament to the level of security delivered by cloud technology. Contact us to learn more about how your organization can benefit from secure cloud technology.