Consumer Cloud: Problem In The Business Model

Consumer Cloud: Problem In The Business Model

Consumer Cloud: Problem in the Business Model

Today, consumers behaviour is quite different from what it used to be a few years ago, especially when the concern at hand is technology, and that too cloud technology. Having been dependent on cloud technology for more than a few years in line, consumers have opted to be at the mercy of their providers more than ever before.

Consumers are therefore more bent on accepting their human resource and security practices more blindly than they used to do a few years ago. The problem has been largely attributed to the increased dependence on cloud as a service or software as a service as we commonly know it. There are a couple of important facts about this phenomena which are important to know and are marked in this article.

Why give up the entire control?

Why should you be giving up entire control of your cloud computing accounts? Recent hacks into really secured systems suggest that it is not impossible to breach into very tightly secured iAccounts of big service providers as well. Cloud providers like Amazon, Google, Apple etc. have all been victims of these security breaches in the past.

The problem at hand is that consumers have practically left the entire control of their accounts in the hands of the cloud service provider. So whenever there is a breach, you end up losing control not only over your account, but possible all the devices connected to your cloud including laptops, PDAs, mobile phones etc. This implies that it is not just your software, you practically end up losing control even on your hardware devices that these days very commonly run on cloud.

Confessions from various cloud providers make us believe that there are numerous attempts per day to hack into the consumer accounts. Though the services providers are smart enough to bypass such attacks, the possibility of these cannot be completely negated. There are times when the hacker with the play of some numbers is able to convince the customer relationship management team of the provider that it is his account. The problem thus is not in how securely built the technology systems are. The problem actually is what loopholes exist in the existing business model and HR practices of the service provider that you are utilising the services of.

What Next?

Though loopholes will continue to exist, it doesn’t really mean that you quit on using the cloud technology as a whole. What you’ve got to do at this moment is keeping full trust over your providers, and utilising the cloud services to the best possible extent. It also pays in not getting frustrated and irritated when you are asked several questions while you call up the CRM team, as this what is being tried to keep your account safe and secure. Should that be a hack call, imagine how much loss it could have caused to you and your business. Cloud service providers are trying hard to put everything at point. However it is perhaps important to modify the existing business model and HR practices to foray into making an end to such breaches.

By Kaamil Nakhasi

——————————————————————–

Popular Reading

Free eBook

“2012 Essential Checklist for Backup and Recovery”

In this new eBook, Greg Shields, Microsoft MVP and VMware vExpert, reveals the essential checklist of 10 capabilities any company’s backup and recovery approach needs to include. Find out if your recovery solution can deliver all ten of these key capabilities and when to consider an upgrade to your backup and recovery approach.

Download this eBook today!

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Aggregated News

Popular News Sources

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

Decreases in Malware Infections at Hamamatsu OpenDNS, a leading provider of cloud-delivered security, today announced that it has enabled Hamamatsu, a Japanese manufacturer of optical sensor technologies, to virtually eliminate malware infections across its U.S. Read the source article at Finance News About Latest Posts Kaamil Latest posts by Kaamil (see all) Oozing Investment For Amazon

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

What Are They Doing With The Hybrid Cloud? “Microsoft is committed to helping enterprise customers realize the tremendous benefits of cloud computing across their own systems, partner clouds and Microsoft Azure,” said Scott Guthrie, executive vice president,Cloud and Enterprise, Microsoft. “With this … Read the source article at CNNMoney About Latest Posts Kaamil Latest posts by Kaamil (see all)

Security Startup – Illumio, Is Winning Big Contracts

Security Startup – Illumio, Is Winning Big Contracts

Security Startup – Illumio A hot new security startup called Illumio has launched today with a repertoire of highly coveted businesses as part of their client portfolio. Illumio today publicly unveiled its Adaptive Security Platform (ASP), the first-ever software platform that provides granular visibility and security for all data center and cloud computing environments. Global