The Biggest Pitfall In Cloud Computing: Security

The Biggest Pitfall in Cloud Computing: Security

Technology is not without its pitfalls even if it has so many benefits, especially if it is not used properly. Cloud computing is no exception; in fact a lot of people think that cloud computing has more pitfalls than the current solutions that they are already employing in their business. Some of these are actually real but can be prevented, while others are just rationalizations out of laziness to plan and execute or even simply an undeniable resistance to change. A lot of people are afraid of change, to step out of the comfort zone. True enough, stepping out of your comfort zone half-heartedly and without a real plan will quickly help you realize these fears. But we shall only tackle the biggest one here.

The most glaring of these pitfalls that people are buzzing on about is security. In a data-driven world, security is paramount. And why shouldn’t it be, it’s the most powerful weapon anyone could possess; whole empires have come crashing down because of a few key pieces information. Granted it would take years to tear down an empire with mere information or disinformation, but it would only require a few minutes for a big company, no, a whole economy to fall because of lost information. Imagine if the worldwide stock exchange entity suddenly lost all of its valuable data including all the backups at the same time, that would be billions in every currency lost, causing an entire worldwide economy collapse.

It’s basically an apocalypse scenario.

Security is a real issue even though it is true that cloud computing is just as safe as traditional systems when it comes to apparent vulnerabilities and security holes. This is because of the nature of cloud computing, the public cloud, there are a lot more people with proximity access to the data. What I mean is that compared to an in-house system where there is virtually no connection to the outside internet, the whole world will now be potentially be able to just walk up to your door, so to speak, in public cloud systems. Let’s consider an analogy, let’s say that you have a really expensive gem hidden inside a safe box, and with the in-house system, other people have no access to the gem because the safe that it is hidden in is in a tower in the middle of a lake. Nobody has actually even seen the safe and most people don’t know that it even exists so the chance of someone trying to steal it is very low. Now in a public cloud scenario the safe would be placed in a very secure building with many locks and guards, but that building has a sign indicating its valuable contents and is located in a very busy market street where a lot of people can see it. This actually increases the chance that someone will be interested in it and that someone may have the skills to steal it.

True that a public cloud provider may have abundance in terms of security measures or even skill, but what is made by man can be unmade by man, so by exposing your precious data to the global public like that, it will only be a matter of time before someone very skilled tries something. The probability of a security breach simply explodes exponentially if you consider every person in the world with internet access a possible intruder. This is much the same as placing cookies on a table that is supposedly unreachable by a child who will eventually find a way to climb up, as opposed to keeping the cookies in the high cupboard away from view and preventing temptation entirely.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

Simple And Recommended SaaS Security Tips

Simple And Recommended SaaS Security Tips

SaaS Security Tips Most people and companies are now using a significant amount of SaaS solutions. Companies are running sales support software, they are file sharing, collaborating and using e-mail programs and a lot more in the cloud. However, that usage also leads to concerns about the security of those solutions. How safe are they? What…

Vendors To Enter The Cyber Security Game

Vendors To Enter The Cyber Security Game

IT Regulatory Compliance as the Next Big Focus for Cloud Vendors Back in October 2014, Defense Information Systems Agency (DISA) submitted a public request for information, calling for the assessment of the marketplace’s ability to “provide cloud ecosystems and services in two integration models that place vendor cloud services on DoD networks for use by…

The Cloud Showdown: How To Determine The Best Cloud Solution For Your Business

The Cloud Showdown: How To Determine The Best Cloud Solution For Your Business

The Cloud Showdown For small and medium businesses (SMB) seeking to grow in 2016, options for increasing efficiency abound. The Cloud offers many benefits for businesses, including slashing IT expenses, providing a more efficient and reliable way to store and back up data, and facilitating collaboration among employees. In fact, 39 percent of SMBs claim…

Cloud-Enabled Managed Hosting: 5 Things A Cloud Provider Should Offer

Cloud-Enabled Managed Hosting: 5 Things A Cloud Provider Should Offer

Cloud-Enabled Managed Hosting The IT industry moves at light speed fueled by constant change and advancement. No area of IT has been affected more by this change than the hosting and managed service space. Advancement in the cloud and its delivery models of IaaS and SaaS have caused a monumental shift in the way IT…

The Meaning Of Secure Business Agility In The Cloud

The Meaning Of Secure Business Agility In The Cloud

Secure Business Agility In The Cloud As cloud continues to accelerate business delivery and shift away the balance of power from IT and InfoSec to business users, organizations need to find ways to ensure that security is part of a business process rather than an afterthought. Today’s organizations are transacting some of their most valuable…

The Internet of Things And The Knowledge Revolution

The Internet of Things And The Knowledge Revolution

The Knowledge Revolution Think about a few things in your life right now. It really doesn’t matter what they are, as long as you interact with them daily. They could be your phone, your shoes, your watch, your car, your refrigerator, your garage door opener…you get the idea. What do all of these things have…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising