Factors That Hurt Cloud Computing Confidence

Factors That Hurt Cloud Computing Confidence

Cloud computing has been called a saint and other great names by friends and foe. It promises great benefits, cost cuts and efficiencies at individual and enterprise level. However, even as momentum grows, uptake figures have not been at all impressive. In fact, experts indicate that the confidence in the cloud and what it can do is waning. This trend is negative. In this article, we look at some of the factors that hurt cloud computing confidence, especially among would be users.

Insecurity in the cloud

Security is one of the hottest cloud computing topics. It worries so many people. Depending on the application whose service you use with the cloud, security cannot be guaranteed. And because of the fact that cloud computing is entirely constructed on the precepts of the internet, it’s hard to convince one security is taken care of. Moreover, more and more companies are attached in the cloud by malicious hackers. These security threats deem user confidence because people love to back up their data, feel it and see it-as is the case with traditional techniques.

Control by service providers

Cloud computing service providers call the shots. The developers choose what to make accessible to the normal users. This means that, users have no say in what they get. They are dictated to by the whims of the providers. This is a negative characteristic. People love it when it’s them who decide what to customize or not.

Internet dependency

Internet dependency for computing is scary. It can limit your ability to access a program if it’s slow. This means that you could lose a lot if anything went wrong. However, with a desktop application, whether or not the internet does exist is a question of no consequence. You can use it whenever you want. Outages and breakdowns in internet communications cannot harm you.

Advertising dangers

Sometimes, the cloud is complicated. To cover expenses, some cloud computing services that are free show adverts. For users, this can be so annoying. Not only is this practice disruptive, but it also makes the user experience poor. This proliferates the malware spread on the internet, phishing, spam and other negatives associated with sudden pop ups and computer viruses.

Privacy and potential for censorships

Committing all your applications to the cloud is a huge risk. Naturally, you give all authority to a given entity, corporate, etc. to manage your personal data. In countries like China where governments are obsessed about monitoring individual liberties, the effects could be detrimental. They can actually descend on personal information at will. This is against all individual rights.

Poor industry regulation framework

Regulation of cloud computing has been discussed at various cloud computing forums. This is because it’s a contentious issue for many consumers. Cloud computing companies have a free hand to run all their affairs. They offer what they deem fit. In most cases, the rights of the consumers are not negotiated in the contracts. This exposes users to a lot of risk and no guarantees. To keep off these problems, people keep off this life saving technology.

By Gregory Musungu

About Gregory

Gregory is a writer from Kenya whose education background is Biotechnology, New Media and Accounting. When his intense passion for the tech sphere is not sending him to experiment with new gadgets and technology, you can find him creatively engaged in Nairobi’s thriving underground art scene, copywriting and design.

View All Articles

Sorry, comments are closed for this post.

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…