The Lighter Side Of The Cloud – Big Data List
The Lighter Side Of The Cloud – Cloud Training
The Lighter Side Of The Cloud –  Size Matters
The Lighter Side Of The Cloud – Waiting For The PS4

The Biggest Pitfall In Cloud Computing: Security

The Biggest Pitfall in Cloud Computing: Security

Technology is not without its pitfalls even if it has so many benefits, especially if it is not used properly. Cloud computing is no exception; in fact a lot of people think that cloud computing has more pitfalls than the current solutions that they are already employing in their business. Some of these are actually real but can be prevented, while others are just rationalizations out of laziness to plan and execute or even simply an undeniable resistance to change. A lot of people are afraid of change, to step out of the comfort zone. True enough, stepping out of your comfort zone half-heartedly and without a real plan will quickly help you realize these fears. But we shall only tackle the biggest one here.

The most glaring of these pitfalls that people are buzzing on about is security. In a data-driven world, security is paramount. And why shouldn’t it be, it’s the most powerful weapon anyone could possess; whole empires have come crashing down because of a few key pieces information. Granted it would take years to tear down an empire with mere information or disinformation, but it would only require a few minutes for a big company, no, a whole economy to fall because of lost information. Imagine if the worldwide stock exchange entity suddenly lost all of its valuable data including all the backups at the same time, that would be billions in every currency lost, causing an entire worldwide economy collapse.

It’s basically an apocalypse scenario.

Security is a real issue even though it is true that cloud computing is just as safe as traditional systems when it comes to apparent vulnerabilities and security holes. This is because of the nature of cloud computing, the public cloud, there are a lot more people with proximity access to the data. What I mean is that compared to an in-house system where there is virtually no connection to the outside internet, the whole world will now be potentially be able to just walk up to your door, so to speak, in public cloud systems. Let’s consider an analogy, let’s say that you have a really expensive gem hidden inside a safe box, and with the in-house system, other people have no access to the gem because the safe that it is hidden in is in a tower in the middle of a lake. Nobody has actually even seen the safe and most people don’t know that it even exists so the chance of someone trying to steal it is very low. Now in a public cloud scenario the safe would be placed in a very secure building with many locks and guards, but that building has a sign indicating its valuable contents and is located in a very busy market street where a lot of people can see it. This actually increases the chance that someone will be interested in it and that someone may have the skills to steal it.

True that a public cloud provider may have abundance in terms of security measures or even skill, but what is made by man can be unmade by man, so by exposing your precious data to the global public like that, it will only be a matter of time before someone very skilled tries something. The probability of a security breach simply explodes exponentially if you consider every person in the world with internet access a possible intruder. This is much the same as placing cookies on a table that is supposedly unreachable by a child who will eventually find a way to climb up, as opposed to keeping the cookies in the high cupboard away from view and preventing temptation entirely.

By Abdul Salam

Abdul

Abdul Salam is IT professional and an accomplished technical writer with CloudTweaks. He earned his undergraduate degree in Information Technology followed by a postgraduate degree in Business Informatics. Abdul possess over 3 years’ experience in technical & business writing with deep knowledge in Cloud Computing, VMware,Oracle, Oracle ERP, Cloud ERP, Microsoft Technologies and Network Communications (Cisco, Juniper). Visit his LinkedIn profile at: http://linkd.in/TtFu7X

Sorry, comments are closed for this post.

Popular Archives

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker Docker started as just a software container on top of a Linux operating system which seemed like a simple optimization for a fat hypervisor. Its disruptive force however comes from the fact that it does force us to rethink many of the layers of the cloud stack. Starting from the way we…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Recent

Churning It Up In The Cloud

Churning It Up In The Cloud

Churning The Corner With SaaS Applications There’s plenty of research that backs up our reasoning for a move to the cloud. Forrester Research claims that the public cloud computing market will reach $191bn in 2020 (everyone else is doing it); Peer1Hosting claims that 49% of IT decision makers are doing it to reduce costs (everyone…

The Growth Of Rampant Digital Diseases

The Growth Of Rampant Digital Diseases

Rampant Digital Diseases Keeping ‘Rombertik’ at Bay – The New Malware that Destroys Hard-Drives A new form of malware is still on the loose, and this one takes malicious to a whole new level. Nicknamed ‘Rombertik’ by Cisco Systems, the malware attempts to infiltrate the victim’s browser to procure confidential information; fairly standard operating procedure…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising