Twitter lost its data through a hack on Google Docs. Learn from this to be very careful how much trust you place on cloud apps and Web 2.0, says Eric Lundquist
7. Who do you trust?
The emerging computing model of melding private and public clouds makes the most sense. Again, you need to have tight control over vital information. If you are going with a cloud vendor, how much control can you exert over the vendor’s IT infrastructure? Can you tweak it to your specs or do you have to take what is offered?
8. Don’t confuse consumer with corporate requirements.
Google applications are great for sharing the little league roster and schedule or a list of your favorite BBQ joints. Those applications are not so good for sharing your corporate financial projections. Use the right tool for the job (and Google apps can’t be hosted in your company).
9. Learn from the mistakes of others.
Your company is not Twitter, but that doesn’t mean you are not a target of the hacking community. Your most important corporate information may be being shared right now on Web-based services. Do you know, have you asked the execs in your company if they are using Google and other shared cloud applications? I’ll bet you’d be surprised by the amount of information going around the cloud.
10. Use strong passwords and change them regularly.
Maybe you can’t stop corporate information from leaking to the cloud, but at least give your co-workers some good advice in using strong passwords that are difficult to hack. Google has some tools to help in this and has sensible limits on the number of access attempts you can make before you are shut out. Use the capabilities that are present in the cloud community even if they are not up to your standards.