What Are The Security Issues Surrounding Cloud Technology?
Save 40% when upgrading to Creative Cloud : For existing CS3 or later customers
This is a guest post by
James Pattrick. freelance writer
The cloud has become a hot topic in the last couple of years.
Every company seems to want a piece of it.
Home users are even taking a bite out of the cloud technology explosion.
It should be noted, however, that as with all new technology there are still some issues to work out.
One of the main issues is the security of cloud networks.
So far, people have been able to use it to share resources without many issues, but the cloud is under attack by hackers.
Virtual Data Backups
The military and corporate industries account for billions of dollars in cloud computing, but there are still some security risks.
The fact that people can access data from anyone in the world opens up a lot of vulnerabilities.
If someone in the military is held hostage, for example, it would be easy to get that person that access data.
They don’t have to go to a location where a server is held.
The hackers could torture the hostage and get access to data without ever entering a building where data is stored.
Another thing that has been questioned is the destruction of the data once it hits the cloud.
Is possible to destroy or completely remove data from the cloud?
Most administrators could not answer this question.
It’s impossible to know if duplicate copies of data are in existence somewhere else once it hits the cloud.
People are always suspicious about uploading sensitive data.
It becomes impossible to wipe the cloud because this is not a physical hard drive.
You can delete the data, but that doesn’t mean that it cannot be retrieved through other means.
These types of loopholes make many employees somewhat skeptical about cloud technology.
Cloud Technology Mishaps Go Public
There have been several big name credit card companies that have had breaches in security for their customers.
This has all led back to the holes in the cloud computer armor.
The fact that millions of credit card accounts were comprised shows that the security measures are weak.
This is something that lots of companies never really put into place so they did not know how it worked.
It often becomes difficult to implement new technology because no one knows how secure it will be.
This was the problem with the cloud.
It was put into place because it was popular.
No one actually had a clue on how to implement it.
Scaling Back Cloud Technology for the Future
Cloud technology will have to be scaled back in a way that makes security tighter.
Right now the cloud is wide open.
It usually doesn’t even require a VPN connection to establish communication.
People can just log in to their accounts and start pulling data down.
This type of activity is what led to so many breaches in security.
A better way would be to implement the technology through limited use or increase levels of security clearance.
This must be done to protect sensitive data.
What Are Your Thoughts??
What one word describes your security issue with the cloud?
Has your company been able to verify that your data is indeed destroyed when deleted?
Terrorism via the cloud is very feasible and possible, what security measures do you believe need to be made to protect expats and employees overseas?
Please share your thoughts in our comments section below!
More articles by Our Audience...
- Latest Technology Requires Higher Skill Levels -- Get Training! - 18-February-2013
- 10 Techniques to Effective Applicant Tracking - 14-February-2013
- Are You Learning Project Management the Right Way? - 14-February-2013
- How Do Those Headshots Get In Google Searches? - 13-February-2013
- Obtain A PMP Certification While Maintaining Your Work Schedule - 24-January-2013
- Entering the Workforce? What You Need to Know About Interviews - 22-January-2013
- How An Effective Absence Management Policy Can Benefit All - 17-January-2013
- The Grinch Who Stole Data - 19-December-2012
- How Cloud Systems Began: The Rise of the Virtual Machine - 12-December-2012
- Infographic: The @Work State of Mind - 29-November-2012
To leave comments, you will need to sign in or register with facebook. To have your comments posted to your own facebook wall, be sure to click the 'Post to Profile' box. To minimize spam, all comments require admin approval before they will be displayed.
Benefits for Registering with The HRIS World
Using our registration option will allow you to receive our latest articles via email (you can opt out at any time) -- either allposts or posts for specific blogs.
|5 Common Hiring Mistakes
Read more about these mistakes, and how to avoid them in this whitepaper.
Podcasts - all articles
Kindle - all blogs
RSS feeds - by blog
Some More Information for You...
For the latest video briefs, check out any of our 50+ playlists on our YouTube channel...ADP : Brasil IT : Brasil IT-BPO : Ceridian : Cloud Computing : Epicor : HR Tech Europe : HR Technology Conference: IHRIM : Insight UK : Intel : Kenexa : Kronos : Mobile News : OpenText : Oracle : PeopleSoft : SAGE : SAP : SHRM : Success Magazine : Taleo : TechnoFunc : TowersWatson
You will also find our Microsoft and Microsoft Office 2010 YouTube video playlists helpful with your learning...Microsoft : Microsoft Office : 365 : Access : Excel : Lync : OneNote : Outlook : PowerPoint : Web Apps : Word : Microsoft Windows phone : Publisher : Project : SharePoint Workspace : Visio
AND NOW - Previews to Microsoft Office 2013 and Microsoft Office 2013 Applications!!!Microsoft : Microsoft Office : Access : Excel : OneNote : Outlook : PowerPoint : Web Apps : Word : Microsoft Windows phone : Publisher : Project : SharePoint : Visio