The Biggest Pitfall In Cloud Computing: Security

The Biggest Pitfall in Cloud Computing: Security

Technology is not without its pitfalls even if it has so many benefits, especially if it is not used properly. Cloud computing is no exception; in fact a lot of people think that cloud computing has more pitfalls than the current solutions that they are already employing in their business. Some of these are actually real but can be prevented, while others are just rationalizations out of laziness to plan and execute or even simply an undeniable resistance to change. A lot of people are afraid of change, to step out of the comfort zone. True enough, stepping out of your comfort zone half-heartedly and without a real plan will quickly help you realize these fears. But we shall only tackle the biggest one here.

The most glaring of these pitfalls that people are buzzing on about is security. In a data-driven world, security is paramount. And why shouldn’t it be, it’s the most powerful weapon anyone could possess; whole empires have come crashing down because of a few key pieces information. Granted it would take years to tear down an empire with mere information or disinformation, but it would only require a few minutes for a big company, no, a whole economy to fall because of lost information. Imagine if the worldwide stock exchange entity suddenly lost all of its valuable data including all the backups at the same time, that would be billions in every currency lost, causing an entire worldwide economy collapse.

It’s basically an apocalypse scenario.

Security is a real issue even though it is true that cloud computing is just as safe as traditional systems when it comes to apparent vulnerabilities and security holes. This is because of the nature of cloud computing, the public cloud, there are a lot more people with proximity access to the data. What I mean is that compared to an in-house system where there is virtually no connection to the outside internet, the whole world will now be potentially be able to just walk up to your door, so to speak, in public cloud systems. Let’s consider an analogy, let’s say that you have a really expensive gem hidden inside a safe box, and with the in-house system, other people have no access to the gem because the safe that it is hidden in is in a tower in the middle of a lake. Nobody has actually even seen the safe and most people don’t know that it even exists so the chance of someone trying to steal it is very low. Now in a public cloud scenario the safe would be placed in a very secure building with many locks and guards, but that building has a sign indicating its valuable contents and is located in a very busy market street where a lot of people can see it. This actually increases the chance that someone will be interested in it and that someone may have the skills to steal it.

True that a public cloud provider may have abundance in terms of security measures or even skill, but what is made by man can be unmade by man, so by exposing your precious data to the global public like that, it will only be a matter of time before someone very skilled tries something. The probability of a security breach simply explodes exponentially if you consider every person in the world with internet access a possible intruder. This is much the same as placing cookies on a table that is supposedly unreachable by a child who will eventually find a way to climb up, as opposed to keeping the cookies in the high cupboard away from view and preventing temptation entirely.

By Abdul Salam

Abdul

Abdul Salam is IT professional and an accomplished technical writer with CloudTweaks. He earned his undergraduate degree in Information Technology followed by a postgraduate degree in Business Informatics. Abdul possess over 3 years’ experience in technical & business writing with deep knowledge in Cloud Computing, VMware,Oracle, Oracle ERP, Cloud ERP, Microsoft Technologies and Network Communications (Cisco, Juniper). Visit his LinkedIn profile at: http://linkd.in/TtFu7X

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Aggregated News

Popular News Sources

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups Wednesday, October 29, 2014 @ 9:00 am/12:00pm ET. Backup and Restore of a SharePoint environment can be a complex endeavor as the product consists of multiple components running at various tiers, each with their own backup and restore requirements. In addition, SharePoint documents are stored as Binary Large Objects (BLOBs) in

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

Decreases in Malware Infections at Hamamatsu OpenDNS, a leading provider of cloud-delivered security, today announced that it has enabled Hamamatsu, a Japanese manufacturer of optical sensor technologies, to virtually eliminate malware infections across its U.S. Read the source article at Finance News About Latest Posts AbdulAbdul Salam is IT professional and an accomplished technical writer with

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

What Are They Doing With The Hybrid Cloud? “Microsoft is committed to helping enterprise customers realize the tremendous benefits of cloud computing across their own systems, partner clouds and Microsoft Azure,” said Scott Guthrie, executive vice president,Cloud and Enterprise, Microsoft. “With this … Read the source article at CNNMoney About Latest Posts AbdulAbdul Salam is IT professional and an