The Biggest Pitfall In Cloud Computing: Security

The Biggest Pitfall in Cloud Computing: Security

Technology is not without its pitfalls even if it has so many benefits, especially if it is not used properly. Cloud computing is no exception; in fact a lot of people think that cloud computing has more pitfalls than the current solutions that they are already employing in their business. Some of these are actually real but can be prevented, while others are just rationalizations out of laziness to plan and execute or even simply an undeniable resistance to change. A lot of people are afraid of change, to step out of the comfort zone. True enough, stepping out of your comfort zone half-heartedly and without a real plan will quickly help you realize these fears. But we shall only tackle the biggest one here.

The most glaring of these pitfalls that people are buzzing on about is security. In a data-driven world, security is paramount. And why shouldn’t it be, it’s the most powerful weapon anyone could possess; whole empires have come crashing down because of a few key pieces information. Granted it would take years to tear down an empire with mere information or disinformation, but it would only require a few minutes for a big company, no, a whole economy to fall because of lost information. Imagine if the worldwide stock exchange entity suddenly lost all of its valuable data including all the backups at the same time, that would be billions in every currency lost, causing an entire worldwide economy collapse.

It’s basically an apocalypse scenario.

Security is a real issue even though it is true that cloud computing is just as safe as traditional systems when it comes to apparent vulnerabilities and security holes. This is because of the nature of cloud computing, the public cloud, there are a lot more people with proximity access to the data. What I mean is that compared to an in-house system where there is virtually no connection to the outside internet, the whole world will now be potentially be able to just walk up to your door, so to speak, in public cloud systems. Let’s consider an analogy, let’s say that you have a really expensive gem hidden inside a safe box, and with the in-house system, other people have no access to the gem because the safe that it is hidden in is in a tower in the middle of a lake. Nobody has actually even seen the safe and most people don’t know that it even exists so the chance of someone trying to steal it is very low. Now in a public cloud scenario the safe would be placed in a very secure building with many locks and guards, but that building has a sign indicating its valuable contents and is located in a very busy market street where a lot of people can see it. This actually increases the chance that someone will be interested in it and that someone may have the skills to steal it.

True that a public cloud provider may have abundance in terms of security measures or even skill, but what is made by man can be unmade by man, so by exposing your precious data to the global public like that, it will only be a matter of time before someone very skilled tries something. The probability of a security breach simply explodes exponentially if you consider every person in the world with internet access a possible intruder. This is much the same as placing cookies on a table that is supposedly unreachable by a child who will eventually find a way to climb up, as opposed to keeping the cookies in the high cupboard away from view and preventing temptation entirely.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

The Internet of Things And The Knowledge Revolution

The Internet of Things And The Knowledge Revolution

The Knowledge Revolution Think about a few things in your life right now. It really doesn’t matter what they are, as long as you interact with them daily. They could be your phone, your shoes, your watch, your car, your refrigerator, your garage door opener…you get the idea. What do all of these things have…

Bimodal IT Is Not The Death of Traditional IT

Bimodal IT Is Not The Death of Traditional IT

Not The Death of Traditional IT If you are a CIO, no doubt you are getting pressure from your line of business managers to provide a more agile IT environment so they can take advantage of faster, easier to use cloud applications. If you’re not providing those services, they are probably using them anyway and…

The Implication Of Consumers Not Having Their Heads In The Cloud

The Implication Of Consumers Not Having Their Heads In The Cloud

Customers CAN Better Protect Themselves The majority of cloud consumers don’t understand what cloud is let alone what the implications of transacting in the cloud or of having their data and digital assets stored in the cloud. As a result most consumers are their own worst enemy when it comes to putting themselves at risk…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

How Your Business Can Overcome Its Fear of BYOD

How Your Business Can Overcome Its Fear of BYOD

Overcoming BYOD Fear While the popularity of the remote workforce has been on the rise, more and more people are returning to the office to work out of fear that their business data isn’t secure, according to a Neustar report. A whopping 83 percent of respondents are worried about the security of their files, and 27…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor