Overcoming Denial In The Cloud

Overcoming Denial In The Cloud

One of the most critical aspects of doing business in the cloud is clarity. When mistakes are made it’s often due to mistaken judgments based on information processed in the brain incorrectly. Marketers must read their audience and a company like Cisco must not over pay in their $1.2 billion bid for Meraki. Misreading your audience or overpaying for an acquisition is far too common. How do we make sure technology decisions today will have a positive impact on our tomorrow? By painting a crystal clear picture about the situation we are facing.

Understanding Denial

Denial is our internal enemy, a way to trick ourselves into thinking we understand what is going on so we can avoid anxious feelings of insecurity. This isn’t done knowingly or intentionally, it’s just a way for us to avoid the anxiety we can experience when making critical assessments of our marketing or spending $1.2 billion on an acquisition.

The executives at Cisco won’t know for sure if their $1.2 billion investment panned out for at least a year after the deal closes. The marketer doesn’t know how the campaign will go until the results are tallied. The difference between success and failure will be in the information they attended to while making their decision. Therefore, the goal is to avoid making decisions based on wishful thinking.

Dealing with Denial

Attention is the critical component when the goal is to make an objective decision. Most of us have a tendency to attend to the aspects of a situation that make us feel less anxious. For example if Cisco’s overarching goal in acquiring Meraki is to be the largest cloud provider, executives will naturally attend to the positives of what closing this deal does to meet this need, sometimes at the expense of the more obvious issues of creating cash flow and turning a profit. When an element of fear is involved the situation is even more likely to result in a blunder.

Let’s say the marketer in our example fears failure. He has hit a rough patch and needs a big win to make up for big losses. His manager has advised him to switch copywriters as the long time standby’s quality has been slipping over the last year. However, the current copywriter is his investor’s son. If denial is in play the marketer isn’t thinking, “I better not fire the copywriter or I will upset the investor.” Instead the marketer is avoiding the issue of the relationship between the investor and the copywriter because he does not want to confront the investor. So he finds another reason, “I better not fire the copywriter because he is so loyal, I’m sure things will turn around.

The key to overcoming denial in the psychological sense is to:

  • 1st – Understand what you fear or typically avoid
  • 2nd – Have your partner or advisor talk you through those issues

By embracing and wrestling with that which we would rather avoid, we can make better decisions in the cloud today.

By Don Cleveland

About don

Although relatively new to technology writing Don Cleveland has been writing and working in the fields of business and psychology over the last 25 years. After earning his B.A. in psychology at the University of South Florida he has returned to finish an M.A. in counseling. His passions are shining psychology’s empirical light on the world of computing and work through research and writing.

View All Articles

Sorry, comments are closed for this post.

Comics
How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…