Top Threats For Cloud Computing

Top Threats For Cloud Computing

Cloud computing reached the point where computing functions as a utility. Here are the top cloud computing threats to help organizations better understand them and make the best choices for their businesses.

Threat no 1: Security threats

With cloud computing managing critical enterprise data, are enterprises and individuals possible victims of hacking and data loss? Although it is not a very common issue, this may occur. For this reason, adoption of cloud computing within industries such as healthcare and finance is not recommended by some. Some providers encrypt data at rest and have backups for customers’ data on tapes or disk drives, and destroy these after a while.

Threat no 2: Outages

Some of the most common outages that may occur are: data backup, down times, and data centers going offline. The good thing is that cloud outages can be predicted. The best method to solve problems with outages is to prevent them. I offered some examples of common outages and how to prevent them in the blog article What are the most common cloud outages and how to prevent them?.

Threat no 3: Malicious Insiders

Malicious insiders are dangerous both inside organizations and with cloud providers. A cloud provider may not reveal the type and level of access to physical and virtual assets of their employees or how it analyzes and reports on policy compliance. So, this means that the level of access granted could enable a malicious insider to harvest confidential data or gain control over the cloud services. However, this kind of information can be detailed in the Service Level Agreement and audit reports, if the customer asks for it.

Threat no 4: Lack of information

Although it may not look like a threat, lack of information regarding where the data center is stored, or what levels of security a data center has, may influence in a negative way cloud computing. I would also like to add this point as a lack of sufficient standards, because for both of these issues I see similar solutions. Although standards are established by worldwide recognized organizations, they are mentioned in the SLA (Service Level Agreement). So, in order to be informed about where your data is located and how it is managed, try to sign a detailed SLA with the provider. I also recommend you to read further on this topic in the Working on a cloud software Service Level Agreement blog article.

Where there is a threat, there is also a solution – at least most of the time. So, what are the top threats for cloud computing you confronted with? And what are the solutions you found?

By Rick Blaisdell / RicksCloud

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Latest posts by CloudTweaks (see all)

5 Responses to Top Threats For Cloud Computing

  1. Cybercriminals are always one step ahead of the latest developments in Internet and cloud computing is no exception. The threat is based on the ability of these cyber criminals to infiltrate networks and cloud providers, with most venerable are registration and validation processes, and credit card fraud. Other likes, by sharing technologies you are sharing risk too. Virtualization is the example as it allows multiple companies (eg clients of a cloud provider) share resources and applications over a single piece of hardware. In addition, you can not always trust the cloud provider’s employees.

  2. Cybercriminals are always one step ahead of the latest developments in Internet and cloud computing is no exception. The threat is based on the ability of these cyber criminals to infiltrate networks and cloud providers, with most venerable are registration and validation processes, and credit card fraud. Other likes, by sharing technologies you are sharing risk too. Virtualization is the example as it allows multiple companies (eg clients of a cloud provider) share resources and applications over a single piece of hardware. In addition, you can not always trust the cloud provider’s employees.

    • I think the most dangerous treat for cloud system is the security threat.  Will all these hacking news coming out everywhere and all over the web, business owners are getting anxious and nervous for their business security .  I have to agree that cyber criminals have their own ways to get inside a system, so cloud should really be careful about this threats by boosting their security levels.

      •  @cloud computing  I do like to extend this list further with few additional threats which might be directly or indirectly related to the one pointed out by you;
         
        5. Insecure Vendor API’s: Weak API’s can prove be a vulnerability point for malicious intruders. 
         
        6. Colocation/Data Amalgamation: Though most are tightly coupled, your data can be mixed with others and vice versa.
         
        7. Identity Theft: Cloud vendors hold most of your private data and it can subject to be used without intimation. 
         
        8. Regulatory Compliance: Is your cloud vendor complying with all the Government and/or industry standards and regulations?
         
        9. Forensic Support: What kind of support is available in-case of a breach? Does the vendor allows your intervention for a joint investigation?
         
        10. Geographic Location of data/services: Where in the world does your data physically exist? 

  3.  @cloud computing  I do like to extend this list further with few additional threats which might be directly or indirectly related to the one pointed out by you;
     
    5. Insecure Vendor API’s: Weak API’s can prove be a vulnerability point for malicious intruders. 
     
    6. Colocation/Data Amalgamation: Though most are tightly coupled, your data can be mixed with others and vice versa.
     
    7. Identity Theft: Cloud vendors hold most of your private data and it can subject to be used without intimation. 
     
    8. Regulatory Compliance: Is your cloud vendor complying with all the Government and/or industry standards and regulations?
     
    9. Forensic Support: What kind of support is available in-case of a breach? Does the vendor allows your intervention for a joint investigation?
     
    10. Geographic Location of data/services: Where in the world does your data physically exist? 


CloudTweaks Sponsors - Find out more!

Popular

Top Viral Impact

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and…

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting. New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting…

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About Latest Posts Follow Us!CloudTweaksEstablished in 2009,…


Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021
contact@cloudtweaks.com

Join our newsletter