Cloud Computing: its security risks.2 min read
Cloud computing is becoming more and more popular amongst companies. It has become a common means of storage for most companies almost eliminating the use of servers on-site in the companies.
The services that were been done by the on-site servers have been moved to the cloud by such companies and the cloud service providers have been given the responsibility to handle that aspect of the company’s IT infrastructure for the company meaning no IT support personnel within the company would have direct responsibility for whatever might occur to the company’s details in the cloud leaving the company at the cloud service providers mercy.
It has been argued that it is not safe to put a company’s data in the cloud. Some have argued that the traditional IT environment is better than the cloud environment since in the traditional environment, the company has control over everything that is going on (Heavey, 2011).
Critics have insisted that the cloud is ripe for internet hackers meaning that any company fall victim to such hacking. Those that are against the cloud also say while consolidation and virtualization may make an IT environment more manageable, it easily serves as an avenue for potential types of attack (Heavey, 2011).
Biggest fear that operates in the companies is that ownership of security in the cloud is spread throughout the organization. Variety of security solutions are to be put in place so that the companies can remain really safe in the cloud say most experts. Their argument is that a company would have a better chance at staying safe if it is vigilant, has the best practices and technology which includes encryption, patching anf monitoring (Heavey, 2011).
Cloud computing is web-based unlike the traditional IT environment where it is desk-top-based meaning whatever information or data is needed can be accessed from any computer that is connected to the Internet (Turban & Volonino, 2010). It also means that sharing is made possible since you can access this information from any computer, leaving whatever information or data accessed at risk and vulnerable for hackers.
There is really no escape from cloud computing because it is rapidly spreading across the globe. “According to the first Cisco Global Cloud Index, cloud computing traffic globally is expected to grow 1200% from 130 exabytes to 1.6 zettabytes annually by 2015. This is about a sixty-six percent growth rate per year” (Alexander, 2011). So I think companies would just have to practice ultra-safe cloud computing by constant monitoring of cloud resource use, blocking unwanted traffic, scanning allowed traffic for malware and alerting security administrators of anomalous activity so that they do not fall victim (Heavey, 2011).
- Heavey, J. (2011). “Cloud Computing: Secure or a Security Risk? “. Retrieved 02 December, 2011 from http://technorati.com/technology/cloud-computing/article/cloud-computing-secure-or-a-security1/
- Turban, E & Volonino, L (2010). Information Technology for Management: Transforming Organizations in the Digital Economy. 7th ed. Asia: Wiley. p61-63.
- Alexander, S. (2011). “Cloud Computing to Grow 1200% by 2015”. Retrieved 02 December, 2011 from http://technorati.com/technology/cloud-computing/article/cloud-computing-to-grow-1200-by/