Organizations that are concerned about the security of their data must investigate the cloud provider's processes and applications related to security fully before using public cloud computing.
a. True
b. False