Where On Earth Is Cloud Data Actually Stored?

Think of cloud computing and the first thing that comes to mind is usually a mainstream application like Google Drive, Dropbox or iCloud, but there is a lot more to it than you might think.

Firstly, we need to understand what cloud computing actually is. In a nutshell, cloud computing is all about storing and retrieving your personal (or corporate) data from your own little area on the Internet. Nothing is stored on your local hard drive and it is accessible from any location, any device and at any time.

If that all sounds a little far-fetched, think about an email service you are already using e.g. Gmail, Yahoo, Hotmail etc. None of those emails you send and receive are actually taking up space on your local hard drive, they are stored on the email providers’ servers: this is a form of cloud computing. To take this example further, remember that you can log in and access your emails from any pc, any laptop, and any smartphone. This is only made possible by the cloud. 

However, many people don’t realise that despite being held in the “cloud”, your data still needs to be physically stored on a device somewhere. 

Whether this is on flash or traditional hard drive storage, companies offering this service still need to have huge servers dedicated to storing your data. These places are often called “server farms” and are essentially vast warehouses filled with servers which are running 24/7/365.

This raises a number of questions: where is my data actually stored? Who has access to my data and is my data safe?

In terms of where your data is stored, it is fairly safe to say that you will never truly know unless you do some digging. The provider may be based in the US (for example), but their servers might be in China, or the UK, or anywhere else in the world. 

Many companies outsource their server farms to satellite locations in order to reduce costs. So it is very difficult to know where your data actually resides, and the cloud provider may not necessarily disclose this.

Who has access to your data is another point to consider. Reputable companies have tried and tested security systems to ensure that only you have access to your data. There are faceless companies out there offering the same amount of storage and functionality, whether you choose to trust them or not, is an important decision. In addition, you should also find out about the safeguards which are in place to keep your data secure and always accessible. Most reputable cloud storage providers will replicate your data several times on different servers to ensure that in the event of a catastrophe, your files are safe. 

This is not to say that your data will ever be 100% safe: natural disasters, fires and malicious damage (for example) are all events which can be planned for, but not necessarily avoided.

The vital point to remember is that although your data is not physically stored on your local hard drive, it is still stored somewhere, and with this in mind it may still be susceptible to the same failures and problems as the hard drive in your laptop or pc. 

Server farms are not invincible; storage media can fail, large corporations can get hacked, and data can get deleted just as easily on a server as it can on your computer, so be wary of storing all of your important and confidential files in the cloud.

OnTrack:

You Might Also Read:

Blockchain Improves Multicloud Network Management:

« NASA’s Poor Cybersecurity Is An Operational Threat
"Cookie Walls" Non-Compliant With GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NetExtend

NetExtend

NetExtend services include backup and recovery, endpoint protection, network monitoring, cloud portal and billing and payment solutions.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

Krista Software

Krista Software

Krista is an intelligent automation platform that combines iPaaS and Conversational AI to automate complete business processes across your teams and apps.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

TELUS

TELUS

TELUS provide Canadian businesses with the services and solutions they need to securely thrive in a digital world. Partner with a cybersecurity leader you can rely on.