Top Threats For Cloud Computing

Top Threats For Cloud Computing

Cloud computing reached the point where computing functions as a utility. Here are the top cloud computing threats to help organizations better understand them and make the best choices for their businesses.

Threat no 1: Security threats

With cloud computing managing critical enterprise data, are enterprises and individuals possible victims of hacking and data loss? Although it is not a very common issue, this may occur. For this reason, adoption of cloud computing within industries such as healthcare and finance is not recommended by some. Some providers encrypt data at rest and have backups for customers’ data on tapes or disk drives, and destroy these after a while.

Threat no 2: Outages

Some of the most common outages that may occur are: data backup, down times, and data centers going offline. The good thing is that cloud outages can be predicted. The best method to solve problems with outages is to prevent them. I offered some examples of common outages and how to prevent them in the blog article What are the most common cloud outages and how to prevent them?.

Threat no 3: Malicious Insiders

Malicious insiders are dangerous both inside organizations and with cloud providers. A cloud provider may not reveal the type and level of access to physical and virtual assets of their employees or how it analyzes and reports on policy compliance. So, this means that the level of access granted could enable a malicious insider to harvest confidential data or gain control over the cloud services. However, this kind of information can be detailed in the Service Level Agreement and audit reports, if the customer asks for it.

Threat no 4: Lack of information

Although it may not look like a threat, lack of information regarding where the data center is stored, or what levels of security a data center has, may influence in a negative way cloud computing. I would also like to add this point as a lack of sufficient standards, because for both of these issues I see similar solutions. Although standards are established by worldwide recognized organizations, they are mentioned in the SLA (Service Level Agreement). So, in order to be informed about where your data is located and how it is managed, try to sign a detailed SLA with the provider. I also recommend you to read further on this topic in the Working on a cloud software Service Level Agreement blog article.

Where there is a threat, there is also a solution – at least most of the time. So, what are the top threats for cloud computing you confronted with? And what are the solutions you found?

By Rick Blaisdell / RicksCloud

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Cloud Has Transformed the Costs and Capabilities of CRM

Cloud Has Transformed the Costs and Capabilities of CRM

Transformation of CRM Services Over the last decade, the Cloud has transformed the costs and capabilities of customer relationship management (CRM) tools. Users can now update and access contacts and sales data anywhere, whether in the office or at an impromptu meeting a hundred miles away. These systems promise an easy setup, decreased cost, and…

Who’s Ready For The Cloud, And Can Deliver!

Who’s Ready For The Cloud, And Can Deliver!

Cloud Ready In my article last month, I discussed how the managed service provider (MSP) industry has been continuously urged to embrace the cloud, but in the end, could they? I answered the questions by describing several impediments and challenges that I believe are preventing MSPs from generating significant revenue and successfully fulfilling their client’s…

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise There is no longer any subjectivity in this statement: security is at the top of list for all CIOs. Every meeting I’ve attended over the last three months has been dominated by the topic of security and when it’s injected into the conversation, it’s not necessarily by my team, but the…

Vendors To Enter The Cyber Security Game

Vendors To Enter The Cyber Security Game

IT Regulatory Compliance as the Next Big Focus for Cloud Vendors Back in October 2014, Defense Information Systems Agency (DISA) submitted a public request for information, calling for the assessment of the marketplace’s ability to “provide cloud ecosystems and services in two integration models that place vendor cloud services on DoD networks for use by…

The Modular Drone Concept In Action

The Modular Drone Concept In Action

The Modular Drone Concept As the Internet of Things (IoT) world explodes around us, it is interesting to think about new ways of solving old problems. For example, drones allow for a potential solutions to a number of long-standing problems. Aerial drones that can carry modules are appearing. These new modular drones have a number…

IoT (Internet of Things) – Don’t Forget The Milk

IoT (Internet of Things) – Don’t Forget The Milk

Don’t Forget The Milk More on the Internet of Bling and some thoughts on the IoT of tomorrow… Last month I talked about the wearable IoT concept of the Internet of Bling. So what is more fashionable than an LED that blinks different colors based on the ambient temperature of the room? Blue when the…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising