Overcoming Denial In The Cloud

Overcoming Denial In The Cloud

One of the most critical aspects of doing business in the cloud is clarity. When mistakes are made it’s often due to mistaken judgments based on information processed in the brain incorrectly. Marketers must read their audience and a company like Cisco must not over pay in their $1.2 billion bid for Meraki. Misreading your audience or overpaying for an acquisition is far too common. How do we make sure technology decisions today will have a positive impact on our tomorrow? By painting a crystal clear picture about the situation we are facing.

Understanding Denial

Denial is our internal enemy, a way to trick ourselves into thinking we understand what is going on so we can avoid anxious feelings of insecurity. This isn’t done knowingly or intentionally, it’s just a way for us to avoid the anxiety we can experience when making critical assessments of our marketing or spending $1.2 billion on an acquisition.

The executives at Cisco won’t know for sure if their $1.2 billion investment panned out for at least a year after the deal closes. The marketer doesn’t know how the campaign will go until the results are tallied. The difference between success and failure will be in the information they attended to while making their decision. Therefore, the goal is to avoid making decisions based on wishful thinking.

Dealing with Denial

Attention is the critical component when the goal is to make an objective decision. Most of us have a tendency to attend to the aspects of a situation that make us feel less anxious. For example if Cisco’s overarching goal in acquiring Meraki is to be the largest cloud provider, executives will naturally attend to the positives of what closing this deal does to meet this need, sometimes at the expense of the more obvious issues of creating cash flow and turning a profit. When an element of fear is involved the situation is even more likely to result in a blunder.

Let’s say the marketer in our example fears failure. He has hit a rough patch and needs a big win to make up for big losses. His manager has advised him to switch copywriters as the long time standby’s quality has been slipping over the last year. However, the current copywriter is his investor’s son. If denial is in play the marketer isn’t thinking, “I better not fire the copywriter or I will upset the investor.” Instead the marketer is avoiding the issue of the relationship between the investor and the copywriter because he does not want to confront the investor. So he finds another reason, “I better not fire the copywriter because he is so loyal, I’m sure things will turn around.

The key to overcoming denial in the psychological sense is to:

  • 1st – Understand what you fear or typically avoid
  • 2nd – Have your partner or advisor talk you through those issues

By embracing and wrestling with that which we would rather avoid, we can make better decisions in the cloud today.

By Don Cleveland

About don

Although relatively new to technology writing Don Cleveland has been writing and working in the fields of business and psychology over the last 25 years. After earning his B.A. in psychology at the University of South Florida he has returned to finish an M.A. in counseling. His passions are shining psychology’s empirical light on the world of computing and work through research and writing.

View All Articles

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…