Accessing The Real Risk Of Cloud Computing

Accessing the Real Risk of Cloud Computing: Is the Sky is Falling or are the Failures a Blip on the Radar Screen?

It’s interesting to follow the big money that big companies are spending. It’s a lot like watching a huge ocean liner set sail for exotic places or a stretch limousine glide though town. These oddities can’t help but be seen but I often wonder if anyone is really watching.

According to a Wall Street Journal article from last spring entitled, “The Sun Shines on The Cloud”  the research firm IDC reported 16 billion in cloud revenue for 2009 and projects a $73 billion investment to be made by 2015. The background of this article is Amazon’s partial cloud failure that kicked Netflix and a host of other customers off the network last June. Amazon explained and apologized and the headlines screamed panic.

At the time and even now Amazon continues with business as usual in the cloud. In Luchi’s Week In Review piece last week on Cloud Tweaks, he reported that Amazon is seeking to control the domain .cloud. The mammoth doesn’t seem very worried about power outages or security risks. Nor has Netflix run away from the cloud when the temporary hitch affected their business. Apparently these disruptions we hear about every now and then are a blip on the radar screen. The big guys are basing their future on the cloud while many remain skeptical and concerned about security. Why can’t smaller companies think like big companies? Perhaps fear holds them back, a fear we are not even aware of.

Fear Conditioning and Memory

Perhaps one of the things that separate big business cloud adoption from small business hesitation is a negative first time experience lodged in one’s memory that is now perceived as fact, also known as fear conditioning. Fear conditioning is the phenomenon that describes fears that develop when one’s initial harrowing experience with a situation is generalized to future related experiences.

If a dog bites a person at an early age they may respond fearfully with all dogs until they can overcome their fear. This happens in part by experiencing the fact that the vast majority of dogs do not bite. Likewise if an executive experiences a harrowing loss of data through a hardware failure he may, without thinking, react negatively to shifting some of his operations to the cloud as he associates this more efficient hypothetical prospect of the cloud with the much more familiar memory when a data loss happened on his watch.

Changing this situation involves reconsolidating one’s memory over time. Every time the memory of the dog bite is retrieved when a dog is presented and nothing bad happens, the fear becomes less and less. As the cloud proves its value over time more and more people will sign on. By then the big guys will be unto the next big thing and those of us who aren’t there yet will still be watching.

By Don Cleveland

About don

Although relatively new to technology writing Don Cleveland has been writing and working in the fields of business and psychology over the last 25 years. After earning his B.A. in psychology at the University of South Florida he has returned to finish an M.A. in counseling. His passions are shining psychology’s empirical light on the world of computing and work through research and writing.

View All Articles

Sorry, comments are closed for this post.

Comics
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…