Report on Hong Kong SME Cloud Adoption and Security Readiness Survey



Similar documents
Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile

Validating Enterprise Systems: A Practical Guide

Cloud Computing for SCADA

GRC Stack Research Sponsorship

BSA-ISSA Information Security Study Online Survey of ISSA Members

Cloud Computing Survey Perception of the companies. DPDP - Macedonia

Capturing the New Frontier:

Cloud Computing Thunder and Lightning on Your Horizon?

Security Officer s Checklist in a Sourcing Deal

How to ensure control and security when moving to SaaS/cloud applications

Release 1. ICAICT814A Develop cloud computing strategies for a business

An SME perspective on Cloud Computing November 09. Survey

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Internet threats: steps to security for your small business

Cloud Courses Description

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

THE TOP 4 CONTROLS.

Cloud Courses Description

AskAvanade: Answering the Burning Questions around Cloud Computing

Awareness, Trust and Security to Shape Government Cloud Adoption

Client Security Risk Assessment Questionnaire

50x Zettabytes*

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Cloud Computing Guidelines

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Is Your Company Ready for a Big Data Breach?

US companies experience and attitudes towards security threats

Credit Unions and The Cloud. By: Chris Sachse

2015 Cloud Security Survey. Security and privacy of sensitive data remains the most disturbing concern for 63% of organizations

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

Methods and Practices: Cloud in Retail

CLOUD COMPUTING READINESS CHECKLIST

Core Solutions of Microsoft Exchange Server 2013

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

Services Providers. Ivan Soto

2013 Market Outlook for Managed Service Providers

Third-Party Risk Management for Life Sciences Companies

Cloud Services Overview

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Industry. Head of Research Service Desk Institute

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Key Considerations of Regulatory Compliance in the Public Cloud

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Nine Steps to Smart Security for Small Businesses

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Vistara Lifecycle Management

Sage ERP The top five reasons to deploy your ERP Solution in the cloud

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Cloud Security: Getting It Right

Cloud Security Who do you trust?

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Guideline on Vulnerability and Patch Management

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

CPI Customer Success Story Sawyer Savings Bank

Managing Cloud Computing Risk

Module 1: Facilitated e-learning

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Cloud Computing: What IT Professionals Need to Know

HP Cloud Services Enablement portfolio for communications service providers: Compute Services. Solution brief

The cloud - ULTIMATE GAME CHANGER ===========================================

Hospital Authority. Enhanced Contingency Planning for IT System Failures

Cloud Computing in Banking

Kroll Ontrack VMware Forum. Survey and Report

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS

Cloud Computing in a GxP Environment: The Promise, the Reality and the Path to Clarity

Hong Kong Baptist University

Security Controls What Works. Southside Virginia Community College: Security Awareness

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

HIPAA Security COMPLIANCE Checklist For Employers

Public Cloud Service Agreements: What to Expect & What to Negotiate. April 2013

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Transcription:

Report on Hong Kong SME Cloud Adoption and Security Readiness Survey Collaborated by Internet Society Hong Kong and Cloud Security Alliance (HK & Macau Chapter) Sponsored by Microsoft Hong Kong Jointly compiled by Chester Soong, Chairman, Internet Society Hong Kong Michael Yung, Chairman, Cloud Security Alliance Hong Kong and Macau Chapter 2 April 2014 Copyright of this report is held jointly by Internet Society Hong Kong, Cloud Security Alliance (HK & Macau Chapter) and Microsoft Hong Kong. 1

Table of Contents Executive Summary... 3 Introduction and Background... 5 Survey mechanism and technical information... 5 Findings and recommendations... 6 Policy design... 6 Findings... 6 Recommendations... 6 Physical security... 7 Findings:... 7 Recommendations:... 7 Data privacy management... 7 Findings:... 8 Recommendations:... 8 System management... 8 Findings:... 8 Recommendations:... 8 Incident management... 10 Findings:... 10 Recommendations:... 10 Cloud technology adoption and application... 10 Findings:... 11 Recommendations:... 11 Conclusion... 12 Appendix I Survey Questionnaire... 14 Appendix II - Statistics and Charts... 19 2

Executive Summary In January 2014, the Internet Society Hong Kong (ISOC HK) and Cloud Security Alliance Hong Kong and Macau Chapter (CSA HK), with the sponsorship from Microsoft (HK), jointly conducted the first Hong Kong SMEs Cloud Readiness Survey. We have received feedback and interviewed 100 local SMEs coming from various industries including retails, manufacturing, Information and communications, imports/exports, financial services, etc. The questionnaire was prepared with six major areas of consideration for adopting Cloud computing services from the SMEs perspectives: Policy design Physical security Data privacy management System management Incident management Cloud technology adoption and application We are encouraged to know from the survey that over 50% of the responding SMEs have adopted some kinds of Cloud computing services. While there are many factors an SME considers before using Cloud services, security is still among its top consideration. Manufacturing comes out the least mature in terms of security maturity and adoption of Cloud services. Compared to those who don t, SMEs using cloud services show a remarkably higher level of security readiness in their overall data management and information security systems, as well as in their ability to handle incidents. This shows that data security should not be perceived as a barrier to using cloud services; on the contrary, adopting cloud computing may be one solution to information security issues (Q7-15) Many SME owners already have some knowledge about cloud security and its execution on a company policy level. However, on a technical level, companies are still limiting proactive security measures to personal computers, such as installing anti-virus software. SMEs in general still lack an understanding about proper software update and protection processes for their important databases and servers case in point, according to the survey results, only 42% of the surveyed SMEs have installed data recovery applications. With limited resources in manpower and specialist knowledge, SMEs can consider a phased implementation of cloud technologies. For example, adopting a hybrid solution that combines a public and private cloud lets SMEs manage and store sensitive data separately from other 3

information. In addition, with personal and commercial cloud services differing greatly in the level of data protection and security, SMEs should choose reliable cloud services providers and commercial cloud services that offer server software and better protection technology. This will allow SMEs to protect their company data and property more comprehensively and effectively, he suggested. Selecting a respectable Cloud service provider is obviously important, and they can follow the Security Guidance for Critical Areas of Focus in Cloud Computing and Cloud Controls Matrix (CCM released by CSA and the Practical Guide for Procuring Cloud Services released by Office of the Government Chief Information Officer. 4

Introduction and Background The Hong Kong Small and Medium-sized Enterprises (SME) Cloud Adoption and Security Readiness Survey was conducted by the Internet Society Hong Kong and the Cloud Security Alliance Hong Kong and Macau Chapter, who commissioned the Hong Kong Productivity Council to carry out telephone interviews to Hong Kong SMEs (<100 employees) over the course of three weeks and to review data from the Census and Statistics Bureau. The Council successfully collected 100 responses to the survey. The research covered major industry sectors in Hong Kong. The survey questionnaire was developed based on the Cloud Security Alliance Cloud Control Matrix international standard with questions adapted to local conditions. The survey was sponsored by Microsoft Hong Kong. Survey mechanism and technical information The survey was conducted between January 29, 2014 and February 20, 2014 with Small- Medium Enterprises (SMEs) locally in Hong Kong with less than 100 employees. The participating candidates selected from HKPC s in-house database, industry directories, and Yellow Pages. Each SME was interviewed by telephone based on a structured Chinese questionnaire with 20 questions. A total of 100 questionnaires were completed at the end of the survey period. The 20 questions try to address the following areas of concerns in terms of Cloud security: Policy design Physical security Data privacy management System management Incident management Cloud technology adoption and application Except with the first two questions about the background of the interviewees, others are given from a 1 to 5 scale indicating the SME s readiness in using Cloud computing services. Detailed analysis and recommendations are discussed in the following sections by their respective areas of concern. 5

Findings and recommendations Policy design From the survey results, we can conclude that: 55% of companies surveyed has security policy in place 65% of companies management will review the policy to ensure it can effectively protect the company s information 61% of companies put in place access right management to data 29% of companies performs security audit and certifications by external parties Findings Most of the companies surveyed have good understanding in security policy setting, review and execution, but most of them have not factored in the need of external auditing and security certification. It indicates slightly over half of the interviewed SMEs have formal or structured security measures implemented within the organization, and that means the rest of them, for whatever reasons to be discussed elsewhere, would rely on the security measures already included in Cloud computing services by the service providers for such protection. This might be the fact that some small companies rather adopt no security measures at all or use only primitive security measures such as the built-in firewall and antivirus solutions from the off-theshelf software providers due to cost. Recommendations Therefore it is suggested to procure IT solutions from reputable services providers that possess related security certifications and resources. For bigger companies, it is suggested to conduct external security audit regularly, preferably once a year. CSA provides documents regarding Cloud security evaluation such as Security Guidance for Critical Areas of Focus in Cloud Computing and Cloud Controls Matrix (CCM). SMEs can rely on the Cloud service providers on evaluating the security measures from typical PaaS and SaaS. 6

Physical security From the survey results, we can conclude that: 62% of the companies manage their IT systems with proper access right and password control, as well as audit trail and exercise. 63% of the companies have people or team to in charge of hardware / software maintenance, as well as support. Findings: Most companies manage their passwords, physical access right, and IT asset appropriately. However, inadequate security control can adversely affects their business continuity and effectiveness of what they believe to be cast-iron defense. For example, once the product license has expired, so go the technical and product support as well. Then the product will run on with known vulnerabilities and waiting to be exploited Recommendations: Companies who are considering or implementing cloud computing solutions shall assess the security risks they are possibly facing, and further strengthen the relevant controls. SMEs are not going to use Cloud computing totally and some office automation software will be installed in-house. So a good but simple security management practice should be recommended and all employees shall be educated in forms of circulars and post-ups. Data privacy management From the survey results, we can conclude that: 63% of companies understand the needs of data access right protection 50% of companies have good understanding or implemented data encryption 70% also have implemented data backup strategy and process. 40% of companies surveyed have data disposal policy devised. 7

Findings: Most companies seem to understand the needs of data access right and backup, and about half of the companies surveyed have good understanding or implemented data encryption. However, most of them lag behind in data disposal. We should praise this kind of good practice, but also remind them many of whom still forget to back up and test them regularly. Backing up to the cloud storage doesn t mean that this is done automatically on a regular basis. Recommendations: As more and more companies placing their company data to the cloud storage, it is important for those companies to establish clear and concise data protection and disposal policy on the cloud. They have to review the data protection policy and service level of the cloud service providers. Paper review on the backup and restore plan is one example that can be done easily. System management From the survey results, we can conclude that: 42% of the companies implemented security patches policy 85% of the companies implemented anti-virus solutions and review / apply regularly 67% of the companies installed firewall devices to further improve the security Findings: Most companies surveyed are poor in implementing security patches in a timely fashion, even though most companies have implemented anti-virus and firewall protection solutions. Recommendations: Careful planning and deployment of applications to the cloud platform can mitigate the risks imposed by outdated security patches. It is suggested to review the vendor solutions and implementation plan cautiously. Companies adopting SaaS mode of cloud services will rely more on Internet browsers and plugins/extensions to access their data. They are more exposed 8

to the Internet than opening files in the local network. They are reminded that they must keep security patch update to mitigate the additional security risks. Companies can refer to Threat & Vulnerability Management as well as the Infrastructure & Virtualization Security sections of the CSA Cloud Control Matrix V3.0 to adopt the best practices. 9

Incident management From the survey results, we can conclude that: 65% of the companies have put in place Incident Response Plan 63% of the companies also have Disaster Recovery Plan prepared. Findings: More than half of the companies already have incident response and disaster recovery plan in place. This result is quite different from previous information security survey done historically as SMEs usually have little resources, and therefore priority, in addressing incident response and DR issues. So there may be a gap exist for the SMEs in terms of the real meaning of incident response and DRP. For the companies claimed to have such measures in place, the maturity and effectiveness of their plans are questionable. Recommendations: When companies migrate to cloud, they need to factor in the role of cloud service providers in incident response, to keep the incident response and disaster recovery plans up-to-date and conduct regular drill, to make sure the plans can perform as designed. Again, we can leverage CSA s Security Guidance for Critical Areas of Focus in Cloud Computing and Cloud Controls Matrix (CCM) or Microsoft s Cloud Security Readiness Tool for guidance. Cloud technology adoption and application From the survey results, we can conclude that: 55% of companies are using or planned to use Cloud services The top two cloud usages are email and storage. Top two reasons of using Cloud Services are the flexibility and good vendor services provided. For those who have not adopted cloud technology, 23% are concerned about information security. 10

Findings: Only half the companies surveyed are using cloud with email and storage as their primary functions. In addition, most companies understand the various benefits of cloud computing, but some think they don't need that yet. For those who have not adopted cloud technology, most (23%) are concerned about information security, and some think cloud services are not reliable. About 13% of the responding companies are not familiar with cloud computing. Recommendations: While security is one important factor that companies consider whether to use cloud services or not, the benefits of using cloud technologies in terms of on-demand provisioning, pay-as-you-go and scaling flexibility, etc. shall be assessed objectively. Cloud services also enable the provision of Security as a Service, which may not be widely known to SMEs at the moment, and more promotion on the advantages of such area is required. 11

Conclusion The adoption of Cloud computing services is getting to the implementing stage. While the multinational companies and government agencies are implementing their cloud services to take advantage of the cost and technologies of Cloud computing, SMEs and even individuals Internet users are playing an increasing part of the whole landscape. The results of this Cloud Security Readiness Survey give a positive outlook of such technology. Most of the respondents have indicated they are aware of the security requirements of adopting such technology, and many of such SMEs have already using many of the subsets of the Cloud services. But as we all know in the practical world, things are always on the move and we still have much to improve to make Cloud computing services to be easily and more confidently adopted by SMEs where such part of the commercial sector can be benefited most. About the Cloud Security Alliance Hong Kong and Macau Chapter The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. CSA is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. The CSA Hong Kong and Macau Chapter is launched in 2012 by a group of local IT professionals, to further expand its presence and focus in Asia-Pacific, About the Internet Society Hong Kong Internet Society Hong Kong (ISOC HK) is the local chapter organization of the Internet Society (ISOC), which is an international and not-for-profit membership society. ISOC HK was formed in 2005 by local veteran Internet professionals with the mission to improve the practice of Internet governance and online civil society in Hong Kong. Consistent with the ISOC statement of purpose, ISOC HK believes in maintaining and extending the development and availability of the Internet and its associated technologies and applications both as an end in itself, and as a means of enabling organizations, professions, and individuals locally and worldwide to more effectively collaborate, cooperate, and innovate in their respective fields and interests. 12

About Microsoft Founded in 1975, Microsoft (Nasdaq MSFT ) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential. The Cloud Security Alliance ("CSA"), Internet Society Hong Kong ("ISOC") and Microsoft Hong Kong have designed and created 2014 Hong Kong SME Cloud Adoption and Security Readiness Survey (the Work ) primarily as an educational resource for SME, cloud computing users, providers and those interested in cloud computing. The CSA, ISOC and Microsoft make no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of any proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, security, governance and assurance professionals should apply their own professional judgment to the specific control circumstances presented by the particular systems or information technology environment 13

Appendix I Survey Questionnaire 香 港 中 小 企 雲 端 應 用 及 保 安 就 緒 程 度 調 查 問 卷 Hong Kong SME Cloud Security Readiness Survey - Questionnaire 調 查 簡 介 您 好! 香 港 互 聯 網 協 會 及 香 港 生 產 力 促 進 局 正 進 行 一 項 有 關 雲 端 應 用 及 保 安 就 緒 程 度 的 調 查 現 誠 邀 閣 下 參 與 是 次 調 查 可 於 10 分 鐘 內 完 成 A. 公 司 資 料 確 認 1. 貴 公 司 主 要 業 務 為..( 只 可 單 選 ) (Q1) 1. 製 造 2. 進 出 口 貿 易 及 批 發 3. 零 售 4. 住 宿 及 膳 食 服 務 5. 資 訊 及 通 訊 6. 金 融 及 保 險 7. 專 業 服 務 ( 包 括 法 律 會 計 顧 問 服 務 廣 告 室 內 設 計 速 遞 服 務 ) 8. 地 產 ( 包 括 地 產 經 紀 裝 修 ) 9. 其 他 ( 請 註 明 ).. 2. 貴 公 司 現 時 於 香 港 辦 公 室 之 總 員 工 人 數.. (Q2) ( 註.. 中 小 企 業 = 於 香 港 聘 用 少 於 100 名 員 工 ; 如 受 訪 公 司 未 能 符 合 上 述 義, 需 終 止 訪 問 ) 於 以 下 部 份, 請 就 有 關 句 子, 於 4 個 答 案 選 項 中, 選 出 最 符 合 貴 公 司 現 時 情 況 的 一 個 選 項 B. 公 司 整 體 資 訊 保 安 政 策 (Policy Design) 14

句 子 答 案 選 項 完 全 不 符 合 (1) 少 部 份 符 合 (2) 大 部 份 符 合 (3) 完 全 符 合 (4) 3. 公 司 具 備 正 式 的 資 訊 保 安 措 施, 以 監 察 審 核 及 持 續 提 升 全 公 司 的 資 訊 保 安 水 平 Q3 4. 公 司 管 理 層 會 檢 視 內 部 的 資 訊 保 安 措 施, 以 確 保 有 關 措 施 能 有 效 保 障 公 司 的 資 訊 保 安 Q4 5. 公 司 的 資 訊 保 安 措 施, 每 年 均 會 由 外 間 獨 立 機 構 / 人 士 透 過 審 計 (Auditing) 或 再 續 証 (Certification ) 等 過 程, 進 行 檢 視 Q5 6. 公 司 具 備 守 則 文 件, 闡 述 不 同 崗 位 員 工 的 資 訊 存 取 權 限, 並 指 示 如 何 處 理 離 職 或 內 部 轉 職 員 工 之 資 訊 存 取 權, 包 括 刪 除 及 更 改 存 取 權 Q6 C. 實 體 保 安 管 理 (Physical Security Management) 句 子 答 案 選 項 完 全 不 符 合 (1) 少 部 份 符 合 (2) 大 部 份 符 合 (3) 完 全 符 合 (4) 7. 公 司 透 過 一 系 列 措 施, 包 括 為 不 同 崗 位 員 工 制 使 用 權 限 採 用 密 碼 保 存 使 用 記 錄 或 進 行 審 計 等, 以 便 中 央 管 理 公 司 的 資 訊 科 技 系 統 ( 如 伺 服 器 ) Q7 8. 公 司 有 專 責 職 員 管 理 內 部 資 訊 科 技 資 產, 包 括 中 央 監 察 相 關 軟 硬 件 的 保 養 期, 及 中 央 統 籌 相 關 軟 硬 件 的 支 援 Q8 D. 數 據 保 安 管 理 (Data Privacy Management) 句 子 答 案 選 項 完 全 不 符 合 (1) 少 部 份 符 合 (2) 大 部 份 符 合 (3) 完 全 符 合 (4) 15

9. 公 司 透 過 一 系 列 措 施, 包 括 為 不 同 崗 位 員 工 制 使 用 權 限 保 留 並 檢 視 存 取 記 錄 等, 以 確 保 公 司 所 儲 存 的 客 戶 數 據 之 安 全 Q9 10. 公 司 有 採 用 數 據 加 密 技 術 於 資 訊 系 統 上, 以 加 強 保 護 內 部 資 料 數 據, 防 止 外 洩, 並 期 檢 視 數 據 保 安 情 況 Q10 11. 公 司 期 將 內 部 數 據 備 份, 並 就 備 份 過 程 期 進 行 檢 視 和 測 試 Q11 12. 公 司 具 備 守 則 文 件 以 指 示 員 工 銷 毀 內 部 數 據, 並 會 保 留 數 據 銷 毀 紀 錄, 以 及 期 檢 討 數 據 銷 毀 過 程 Q12 E. 系 統 管 理 (System Management) 句 子 答 案 選 項 完 全 不 符 合 (1) 少 部 份 符 合 (2) 大 部 份 符 合 (3) 完 全 符 合 (4) 13. 內 部 專 責 職 員 通 常 於 修 補 程 式 (Patch) 發 佈 後 的 一 段 固 時 間 內 ( 如 發 佈 後 一 個 月 內 ), 測 試 修 補 程 式 通 過 測 試 後, 修 補 程 式 會 被 自 動 安 裝 於 公 司 所 有 連 接 網 絡 的 電 腦 內 Q13 14. 公 司 所 有 連 接 網 絡 的 電 腦 均 裝 有 防 毒 軟 件 該 套 軟 件 由 公 司 提 供 並 負 責 期 更 新 公 司 亦 會 期 檢 視 防 毒 軟 件 的 表 現, 以 確 保 公 司 的 資 訊 保 安 水 平 Q14 15. 除 了 使 用 互 聯 網 服 務 供 應 商 的 防 火 牆 外, 公 司 亦 自 行 裝 設 額 外 防 火 牆 ( 硬 件 或 軟 件 ) 以 加 強 保 護 公 司 會 中 央 管 理 該 防 火 牆, 並 會 期 為 該 防 火 牆 進 行 審 計 工 作 Q15 F. 事 故 處 理 (Incident Management) 句 子 答 案 選 項 完 全 不 符 合 (1) 少 部 份 符 合 (2) 大 部 份 符 合 (3) 完 全 符 合 (4) 16

16. 公 司 具 備 守 則 文 件 以 指 示 員 工 處 理 內 部 資 訊 保 安 事 故 ( 例 如 電 腦 失 竊 資 料 外 洩 ) 公 司 亦 會 期 檢 視 測 試 及 更 新 相 關 守 則 Q16 17. 公 司 備 有 災 難 復 原 計 劃 (Disaster Recovery Plan) 備 用 電 腦 和 備 份 數 據 庫, 以 便 於 資 訊 保 安 事 故 後, 盡 快 恢 復 公 司 運 作 公 司 亦 期 檢 視 和 測 試 災 難 復 原 計 劃 Q17 G. 雲 端 資 訊 科 技 應 用 情 況 (Cloud Technology Application) 18. 貴 公 司 有 否 使 用 任 何 雲 端 資 訊 科 技 應 用 方 案 ( 雲 端 資 訊 科 技 應 用 義.. 讓 中 小 企 透 過 互 聯 網 和 流 動 網 絡, 以 相 對 低 廉 的 起 動 成 本, 採 用 切 合 其 運 作 規 模 的 資 訊 科 技 應 用 出 自 立 法 會 )?(1 = Yes, 0 = No) 現 正 使 用, 請 註 明 ( 可 選 多 項 )..Q18 (0) 電 郵 (1) 辦 公 室 協 作 工 具 (2) 銷 售 (3) 客 戶 關 係 管 理 (4) 資 料 存 儲 (5) 財 務 (6) 企 業 資 源 規 劃 (7) 人 力 資 源 管 理 (8) 數 據 運 算 (9) 軟 件 開 發 (10) 軟 件 測 試 (11) 其 他 ( 請 註 明 ).. (12) è 完 成 選 擇 後, 往 Q19 現 在 沒 有 使 用, 但 正 考 慮 / 研 究 相 關 方 案 è Q20 (13) 現 在 沒 有 使 用, 短 期 內 亦 不 考 慮 è Q20 (14) 19. 請 闡 述 使 用 雲 端 資 訊 科 技 應 用 方 案 的 原 因 ( 可 選 多 項 )..Q19 (1 = Yes, 0 = No) 起 首 的 投 資 較 少 ( 軟 / 硬 件 )(1) 可 倚 賴 方 案 供 應 商 的 支 援 (2) 費 用 投 資 方 面 的 彈 性 較 大 (3) 可 享 用 最 新 科 技 (4) 其 他 ( 請 註 明 ).. (5) 20. 請 闡 述 不 使 用 雲 端 資 訊 科 技 應 用 方 案 的 原 因 ( 可 選 多 項 )..Q20 (1 = Yes, 0 = No) 17

對 雲 端 資 訊 科 技 不 太 認 識 ) (1) 資 訊 保 安 的 考 慮 (2) 感 覺 上, 雲 端 服 務 不 太 穩 (3) 害 怕 雲 端 服 務 供 應 商 倒 閉, 因 而 損 失 正 使 用 的 雲 端 方 案 中 的 數 據 (4) 害 怕 雲 端 服 務 供 應 商 倒 閉, 因 而 損 失 所 繳 費 用 (5) 其 他 ( 請 註 明 ).. (6) 問 卷 完 18

Appendix II - Statistics and Charts SME_CloudSecurity_ APPENDIX_II_Charts.pdf 19