Top threats for cloud computing

Cloud computing reached the point where computing functions as a utility. Here are the top cloud computing threats to help organizations better understand them and make the best choices for their businesses.

Threat no 1: Security threats

With cloud computing managing critical enterprise data, are enterprises and individuals possible victims of hacking and data loss? Although it is not a very common issue, this may occur. For this reason, adoption of cloud computing within industries such as healthcare and finance is not recommended by some. Some providers encrypt data at rest and have backups for customers’ data on tapes or disk drives, and destroy these after a while.

Threat no 2: Outages

Some of the most common outages that may occur are: data backup, down times, and data centers going offline. The good thing is that cloud outages can be predicted. The best method to solve problems with outages is to prevent them. I offered some examples of common outages and how to prevent them in the blog article What are the most common cloud outages and how to prevent them?.

Threat no 3: Malicious Insiders

Malicious insiders are dangerous both inside organizations and with cloud providers. A cloud provider may not reveal the type and level of access to physical and virtual assets of their employees or how it analyzes and reports on policy compliance. So, this means that the level of access granted could enable a malicious insider to harvest confidential data or gain control over the cloud services. However, this kind of information can be detailed in the Service Level Agreement and audit reports, if the customer asks for it.

Threat no 4: Lack of information

Although it may not look like a threat, lack of information regarding where the data center is stored, or what levels of security a data center has, may influence in a negative way cloud computing. I would also like to add this point as a lack of sufficient standards, because for both of these issues I see similar solutions. Although standards are established by worldwide recognized organizations, they are mentioned in the SLA (Service Level Agreement). So, in order to be informed about where your data is located and how it is managed, try to sign a detailed SLA with the provider. I also recommend you to read further on this topic in the Working on a cloud software Service Level Agreement blog article.

Where there is a threat, there is also a solution – at least most of the time. So, what are the top threats for cloud computing you confronted with? And what are the solutions you found?

Photo source: http://www.sxc.hu/photo/806152

Share This Post

Related Articles

10 Responses to “Top threats for cloud computing”

  1. Michael says:

    Rick, I believe you missed, in my opinion, one of the most significant threats . . . . Lack of understanding of what Cloud offers. I see this on both sides of the spectrum (i.e. clients & vendors). Until people begin to understand how they can incorporate “cloud” into their every day technology usage “cloud” will have a hard time maintaining any foothold. I realize your blog is talking more to framework of cloud, but maybe a follow-up blog could talk to potential options for gaining “cloud” adoption.

    • Hi Michael. Thank you for your comment, I totally agree that the lack of understanding the benefits and characteristics of cloud computing is another significant threat. I will debate this topic in a future article.

  2. [...] For this reason, adoption of cloud computing within industries such as healthcare and finance is not recommend by some. Some providers encrypt data at rest …www.rickscloud.com/top-threats-for-cloud-computing/ [...]

  3. The Cloud is a great idea, but as you stated, there are a lot of security questions that need to be answered. The more people think about the possible threats, the quicker these threats will be resolved.

  4. IT Services says:

    Oh my goodness! an amazing article dude. http://www.rickscloud.com is really good. Thank you However I am experiencing issue with ur rss . Don’t know why Unable to subscribe to it. Is there anyone getting identical rss problem? Anyone who knows kindly respond. Thnkx

  5. Loss of control and flexibility issues are always there as well for the cloud computing service acquirers. You cannot just get updates software and system requirements at any point when you need them. No data redundancy check means that there is no control over the data management as well.

    Regards

    .S-

  6. [...] with data offloaded to the cloud are exposed to possible security breaches like hacking. This happens if the cloud service providers fail to address the security issues in [...]

  7. [...] with data offloaded to the cloud are exposed to possible security breaches like hacking. This happens if the cloud service providers fail to address the security issues in [...]

  8. [...] with data offloaded to the cloud are exposed to possible security breaches like hacking. This happens if the cloud service providers fail to address the security issues in [...]

Leave a Reply

 

© 2014 Rickscloud. All rights reserved. Site Admin · Entries RSS · Comments RSS

Login