The Biggest Pitfall In Cloud Computing: Security

The Biggest Pitfall in Cloud Computing: Security

Technology is not without its pitfalls even if it has so many benefits, especially if it is not used properly. Cloud computing is no exception; in fact a lot of people think that cloud computing has more pitfalls than the current solutions that they are already employing in their business. Some of these are actually real but can be prevented, while others are just rationalizations out of laziness to plan and execute or even simply an undeniable resistance to change. A lot of people are afraid of change, to step out of the comfort zone. True enough, stepping out of your comfort zone half-heartedly and without a real plan will quickly help you realize these fears. But we shall only tackle the biggest one here.

The most glaring of these pitfalls that people are buzzing on about is security. In a data-driven world, security is paramount. And why shouldn’t it be, it’s the most powerful weapon anyone could possess; whole empires have come crashing down because of a few key pieces information. Granted it would take years to tear down an empire with mere information or disinformation, but it would only require a few minutes for a big company, no, a whole economy to fall because of lost information. Imagine if the worldwide stock exchange entity suddenly lost all of its valuable data including all the backups at the same time, that would be billions in every currency lost, causing an entire worldwide economy collapse.

It’s basically an apocalypse scenario.

Security is a real issue even though it is true that cloud computing is just as safe as traditional systems when it comes to apparent vulnerabilities and security holes. This is because of the nature of cloud computing, the public cloud, there are a lot more people with proximity access to the data. What I mean is that compared to an in-house system where there is virtually no connection to the outside internet, the whole world will now be potentially be able to just walk up to your door, so to speak, in public cloud systems. Let’s consider an analogy, let’s say that you have a really expensive gem hidden inside a safe box, and with the in-house system, other people have no access to the gem because the safe that it is hidden in is in a tower in the middle of a lake. Nobody has actually even seen the safe and most people don’t know that it even exists so the chance of someone trying to steal it is very low. Now in a public cloud scenario the safe would be placed in a very secure building with many locks and guards, but that building has a sign indicating its valuable contents and is located in a very busy market street where a lot of people can see it. This actually increases the chance that someone will be interested in it and that someone may have the skills to steal it.

True that a public cloud provider may have abundance in terms of security measures or even skill, but what is made by man can be unmade by man, so by exposing your precious data to the global public like that, it will only be a matter of time before someone very skilled tries something. The probability of a security breach simply explodes exponentially if you consider every person in the world with internet access a possible intruder. This is much the same as placing cookies on a table that is supposedly unreachable by a child who will eventually find a way to climb up, as opposed to keeping the cookies in the high cupboard away from view and preventing temptation entirely.

By Abdul Salam

Sorry, comments are closed for this post.

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…