Security Dangers Of Cloud Computing

Security Dangers Of Cloud Computing

Security Dangers Of Cloud Computing

How Things Have Changed

As we’ve seen on this website, cloud computing has an untold number of virtues. From improved portability to increased green credentials of the IT sector and from revolutionising industries to helping the disabled, it is undeniable that the cloud has radically altered our daily lives. Nonetheless, to assume that cloud computing comes without security risks would be both short-sighted and naïve.

Heartbleed, the NSA, WikiLeaks, cybercriminals, and hackers – the list of people who want to exploit your personal information is endless. Sadly complete technological security is difficult to achieve and most users leave their data open to exploitation by making themselves an easy target for the aforementioned groups. Although governments are trying hard to improve the cloud’s security with use of data protection and in-country servers, the reality is that problems will still occur.

Data Centres

We recently looked at reasons why SMEs should do their accounting in the cloud. Although we discovered a number of beneficial reasons, the nature of cloud computing still means that ultimately someone else is looking after your information in an offsite data centre.

That host has a huge amount of control over your information. They are responsible for all updates and have access to your data. Most importantly they are highly unlikely to be as rigorous or precautious with your data as you would be if you used your own onsite data centre. Make sure you choose your host wisely.

Legal Liability

As hackers and cybercriminals become more prevalent we are seeing an increased incidence of data breaches occurring. These breaches can often lead to mass data loss, and in an ever-increasing world of compliance, legal liability, and business continuity that data loss will often result in lawsuits and extended court cases.

Companies are now being directly held to account for inadequate safeguards and lack of privacy protection. While these measures are undeniably expensive to implement, a drawn-out battle through the courts is infinitely more expensive. The recent data breach at Target, which saw up to 70 million customers have personal information and credit card details stolen, could end up costing the company as much as $1.1 billion in lawsuits and compensation claims from the banking industry.

security-image

(Image Source: Shutterstock)

Insider Threats

Although less of a concern for small businesses, the threat of an employee stealing data for either personal gain or corporate humiliation is a very real danger for larger organisations. Some of the most serious recent breaches are a result of an ‘insider job’ – including the Vodafone breach of 2 million customers’ bank details and the now infamous theft of NSA data by Edward Snowden.

In both these examples the data was stolen by a person with access to a privileged user access. Once an employee gains access to a company’s cloud, everything from customer data to confidential information and intellectual property can easily be extracted.

The threat doesn’t end there. Small businesses who do not implement sufficient security could see a former employee with a grudge and a computer potentially delete the entire organisation’s cloud – a move which would have disastrous consequences for a company’s clients and its reputation.

What do you think are the biggest security challenges facing a business which uses the cloud? Let us know in the comments below.

By Daniel Price

Follow Me!

Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.
Follow Me!

2 Responses to Security Dangers Of Cloud Computing

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues Nowadays, many companies are changing their overall information technology strategies to embrace cloud computing in order to open up business opportunities.  There are numerous definitions of cloud computing. Simply speaking, the term “cloud computing” comes from network diagrams in which cloud shapes are  used to describe certain types of networks. All…

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and…

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends For nearly every business, the concept of business intelligence is nothing new. Ambitious organizations have been searching for any type of data-driven advantage for some time now – perhaps for as long as they’ve existed. However, the historical use of competitive intelligence pales in comparison to the…

Featured Sponsors

Sponsors

Can You Run Your Business Entirely From A Mobile Device?

Can You Run Your Business Entirely From A Mobile Device?

Can You Run Your Business Entirely From A Mobile Device? You know the feeling. It’s 8:00 a.m. Your bus is stuck in traffic, so you pull out your phone and start answering work emails. While you may rely on your mobile device’s apps for everything from an alarm clock to a fitness tracker to a…

Placement Opportunities - Find Out!

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter