Top Threats For Cloud Computing

Top Threats For Cloud Computing

Cloud computing reached the point where computing functions as a utility. Here are the top cloud computing threats to help organizations better understand them and make the best choices for their businesses.

Threat no 1: Security threats

With cloud computing managing critical enterprise data, are enterprises and individuals possible victims of hacking and data loss? Although it is not a very common issue, this may occur. For this reason, adoption of cloud computing within industries such as healthcare and finance is not recommended by some. Some providers encrypt data at rest and have backups for customers’ data on tapes or disk drives, and destroy these after a while.

Threat no 2: Outages

Some of the most common outages that may occur are: data backup, down times, and data centers going offline. The good thing is that cloud outages can be predicted. The best method to solve problems with outages is to prevent them. I offered some examples of common outages and how to prevent them in the blog article What are the most common cloud outages and how to prevent them?.

Threat no 3: Malicious Insiders

Malicious insiders are dangerous both inside organizations and with cloud providers. A cloud provider may not reveal the type and level of access to physical and virtual assets of their employees or how it analyzes and reports on policy compliance. So, this means that the level of access granted could enable a malicious insider to harvest confidential data or gain control over the cloud services. However, this kind of information can be detailed in the Service Level Agreement and audit reports, if the customer asks for it.

Threat no 4: Lack of information

Although it may not look like a threat, lack of information regarding where the data center is stored, or what levels of security a data center has, may influence in a negative way cloud computing. I would also like to add this point as a lack of sufficient standards, because for both of these issues I see similar solutions. Although standards are established by worldwide recognized organizations, they are mentioned in the SLA (Service Level Agreement). So, in order to be informed about where your data is located and how it is managed, try to sign a detailed SLA with the provider. I also recommend you to read further on this topic in the Working on a cloud software Service Level Agreement blog article.

Where there is a threat, there is also a solution – at least most of the time. So, what are the top threats for cloud computing you confronted with? And what are the solutions you found?

By Rick Blaisdell / RicksCloud

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

5 Responses to Top Threats For Cloud Computing

  1. Cybercriminals are always one step ahead of the latest developments in Internet and cloud computing is no exception. The threat is based on the ability of these cyber criminals to infiltrate networks and cloud providers, with most venerable are registration and validation processes, and credit card fraud. Other likes, by sharing technologies you are sharing risk too. Virtualization is the example as it allows multiple companies (eg clients of a cloud provider) share resources and applications over a single piece of hardware. In addition, you can not always trust the cloud provider’s employees.

  2. Cybercriminals are always one step ahead of the latest developments in Internet and cloud computing is no exception. The threat is based on the ability of these cyber criminals to infiltrate networks and cloud providers, with most venerable are registration and validation processes, and credit card fraud. Other likes, by sharing technologies you are sharing risk too. Virtualization is the example as it allows multiple companies (eg clients of a cloud provider) share resources and applications over a single piece of hardware. In addition, you can not always trust the cloud provider’s employees.

    • I think the most dangerous treat for cloud system is the security threat.  Will all these hacking news coming out everywhere and all over the web, business owners are getting anxious and nervous for their business security .  I have to agree that cyber criminals have their own ways to get inside a system, so cloud should really be careful about this threats by boosting their security levels.

      •  @cloud computing  I do like to extend this list further with few additional threats which might be directly or indirectly related to the one pointed out by you;
         
        5. Insecure Vendor API’s: Weak API’s can prove be a vulnerability point for malicious intruders. 
         
        6. Colocation/Data Amalgamation: Though most are tightly coupled, your data can be mixed with others and vice versa.
         
        7. Identity Theft: Cloud vendors hold most of your private data and it can subject to be used without intimation. 
         
        8. Regulatory Compliance: Is your cloud vendor complying with all the Government and/or industry standards and regulations?
         
        9. Forensic Support: What kind of support is available in-case of a breach? Does the vendor allows your intervention for a joint investigation?
         
        10. Geographic Location of data/services: Where in the world does your data physically exist? 

  3.  @cloud computing  I do like to extend this list further with few additional threats which might be directly or indirectly related to the one pointed out by you;
     
    5. Insecure Vendor API’s: Weak API’s can prove be a vulnerability point for malicious intruders. 
     
    6. Colocation/Data Amalgamation: Though most are tightly coupled, your data can be mixed with others and vice versa.
     
    7. Identity Theft: Cloud vendors hold most of your private data and it can subject to be used without intimation. 
     
    8. Regulatory Compliance: Is your cloud vendor complying with all the Government and/or industry standards and regulations?
     
    9. Forensic Support: What kind of support is available in-case of a breach? Does the vendor allows your intervention for a joint investigation?
     
    10. Geographic Location of data/services: Where in the world does your data physically exist? 

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future of Work: What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at…

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts It’s no secret that Cloud Computing is more than just a buzz term as that ship has sailed off a long time ago. More and more companies are adopting the uses and benefits of cloud computing while aggressively factoring cloud services spending into their budget. Included is an excellent…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic –  The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Featured Sponsors

Watching You Shop: Stores And Mannequins “Read” Their Customers And Respond

Watching You Shop: Stores And Mannequins “Read” Their Customers And Respond

Watching You Shop The mannequin in the store window stares blankly ahead as shoppers look at the clothes it is dressed in and contemplate a purchase. One shopper makes some comments. “It’s nice. I wonder if they have my size.” Another takes a few steps inside the store to see where these particular clothes might…

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

Sponsors

Cloud ERP Starter’s Guide: When QuickBooks Is Not Enough

Cloud ERP Starter’s Guide: When QuickBooks Is Not Enough

Cloud ERP Starter’s Guide: When QuickBooks Is Not Enough You’ve been running your small business on QuickBooks, or a product like it, to automate your accounting function and produce basic financial reports. So, what’s wrong? Things just don’t seem to be working well. It takes too long to get a “picture” of how your business…

Placement Opportunities - Find Out!

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter