Benefits & Threats of Using Cloud Computing

0
254
cloud-computing

Four Benefits of Cloud Computing

When talking about the digital transition and its benefits, it is rare not to mention the contributions of the Cloud Computing. Very concretely with the Cloud, data and programs are not stored physically, locally, on a server or a computer, but remotely. It is accessed from any device connected to the Internet.

When we talk about the Cloud, comes the subject of the SaaS. It is a commercial exploitation of software, based on the power of the Cloud. It provides access to a service and data hosted in the cloud from an Internet browser.

It completely changes the business model: with SaaS, users no longer purchase a license, but pay a subscription, monthly or yearly, to use the software. It must be said that this technology has many advantages.

1. Anywhere, Anytime

As an accountant, you may want to travel to your clients, for example, to discuss the latest balance sheet, for a consulting assignment, or to discuss a potential investment. However, you will have to access the data that concerns your customer.

There are two solutions available to you if you do not have a laptop: either you store everything on a USB key, and take the risk of losing it (which means that confidential data would be found in nature !) Or forget to copy important files, either you store everything in the Cloud, and you can open any file from anywhere, anytime. As much to say that the second solution seems to be the most practical!

2. Compatibility with the Different Platforms

With the Cloud and the SaaS model, you can start editing a document (for example, a forecast for a new customer) from a first computer, to complete it from a tablet, and finalize it from a laptop. The files synchronize in real time: just connect a device to the Internet to continue the work!

3. Data Security

As mentioned above, data security can be compromised by local storage on a device such as a USB key. Cloud systems offer an extremely advanced level of file protection – relying on technologies that are far too expensive for most accounting firms. Ensure your customers that they will not see their strategic information disappear, or be the object of a piracy!

4. Little Capital Expenditure

With the traditional software management and adoption solution, it is often necessary to check the compatibility of a fleet of machines with the hardware requirements. In other words, if you are talking about an unavoidable program (like a management solution, like Quickbooks ), you have to accept to invest in new hardware!

With cloud computing, your firm does not have to invest much in one go, since everything is managed remotely and you just have to have computers powerful enough to access the Internet. You can dedicate your investment budget to the purchase, for example, of tablets to access programs from other devices, and multiply the efficiency of your practice!

Four threats of Cloud Computing which are overlooked:

Security risks associated with the use of cloud computing is the biggest concern in various places. Let’s check them all.

1. The Threat of the Insiders

Is there still a threat from an insider (ie from inside)? Unfortunately, virtualization and the cloud are increasing the risks arising from insider threats.
As cloud systems become managed by the cloud infrastructure management team, fewer administrators will have access to the data and systems than ever before. It means that there is room for human beings who could get access to the confidential data.

In other words, if the authority is not trustworthy the risk of insider attack will increase.
Whether it is good or bad, it is much easier to take away important assets in virtualized environments than traditional reality environments.

For Example: If you have administrator privileges in the Cloud, you can select the virtual environment, right-click and copy it, and when we talk about traditional storage, it is always difficult to come out of the building with a tape box.Stealing is easier if you have a virtual machine on a USB drive.

2. Risk of being multi-tenant type in private and hybrid cloud

Many companies hit the walls when building private and hybrid clouds. Easy things such as test environment and file sharing are virtualized.

“Many companies are virtualizing about 30% of the infrastructure, although they want to make it about 60% to 70%“.


Multi-tenant type is not a problem only for public cloud. Units with different business units and thus often different security guidelines use the same infrastructure in private and hybrid clouds.

“The risk of a system owned by a business unit with superior security guidance is increased by poor security guidelines of the upper business units, which are very difficult to measure, especially for large international organizations. ”

“Companies private infrastructure are separated by an air gap. Therefore, the biggest threat to a number of virtualization and private cloud environment’s could be the configuration mistakes. 80% downtime is due to an inappropriate change in the management system.”

3. Private cloud is not actually private

One way that companies concerned about security take in the cloud are to adopt a private cloud. It is not uncommon for companies to adopt private clouds to gain both advantages. In other words, it is to avoid the cost efficiency effect of the cloud and the visible security risk of the public cloud. However, so many private clouds are not all private. Many private and cloud infrastructures are actually operated by third parties, concerns about access by high-level users in the provider remains, and the implementation details of security and its risks are unclear.

In other words, it is to avoid the cost efficiency effect of the cloud and the visible security risk of the public cloud. However, so many private clouds are not all private. Many private and cloud infrastructures are actually operated by third parties, concerns about access by high-level users in the provider remains, and the implementation details of security and its risk are unclear.

Many private and cloud infrastructures are actually operated by third parties, concerns about access by high-level users in the provider remains, and the implementation details of security and its risk are unclear.

Most of the cloud security statements are obsolete. At the recent RSA Conference, a number of people said that the key to cloud security is to have a robust SLA covering security in detail. It is a good idea to clarify the scope of responsibility, as long as the service provider has accountability. Although this is true in a sense, it simply trusts the vendor and simply trusts the SLA with everything.

If confidential intellectual property and customer information are stolen, it is not your service provider, who will be blamed but the Cloud customers are blamed by the directors and their customers. Service providers advocating security standards may not pay much attention to security. It means that you should not believe blindly what the provider says.

4. Difficult to deal with DIY Security in Cloud Computing

It is no longer safe to be a small site, threats come from everywhere because being in the United States is not only exposed to attacks. Everyone is threatened by attacks from everywhere, including China, Russia, Somalia.It is also a terrible idea to ask people in the IT department to work too hard. As more companies move to the cloud-based infrastructure, only large companies that have plenty of budgets will be able to implement security measures on their own. Many other people will need to take security as a service or a utility. However, aimed attacks are on a global scale. If you share infrastructure with more eye-catching companies, your company may become a foothold of attacks targeting neighbors. In other words, in the cloud, we can not deal with DIY (DO it Yourself) type of security.

As more companies move to the cloud-based infrastructure, only large companies that have plenty of budgets will be able to implement security measures on their own. Many other people will need to take security as a service or a utility. However, aimed attacks are on a global scale. If you share infrastructure with more eye-catching companies, your company may become a foothold of attacks targeting neighbors. In other words, in the cloud, we can not deal with DIY (DO it Yourself) type of security.

However, aimed attacks are on a global scale. If you share infrastructure with more eye-catching companies, your company may become a foothold of attacks targeting neighbors. In other words, in the cloud, we can not deal with DIY (DO it Yourself) type of security.

 

 

Leave a Reply

Be the First to Comment!

Notify of
avatar
wpDiscuz